id
stringlengths
2
7
text
stringlengths
17
51.2k
title
stringclasses
1 value
c174700
!= nil { return nil, err } return wrapTLS(scheme, tlsinfo, l) }
c174701
cs = append(cs, info.TrustedCAFile) } return cs }
c174702
cfg.ClientAuth = tls.RequireAndVerifyClientCert } cs := info.cafiles() if len(cs) > 0 { cp, err := tlsutil.NewCertPool(cs) if err != nil { return nil, err } cfg.ClientCAs = cp } // "h2" NextProtos is necessary for enabling HTTP2 for go's HTTP server cfg.NextProtos = []string{"h2"} return cfg, nil }
c174703
var block *pem.Block block, _ = pem.Decode(certPEMBlock) cert, err := x509.ParseCertificate(block.Bytes) if err != nil { return tls.Certificate{}, err } if len(cert.Subject.CommonName) != 0 { hasNonEmptyCN = true cn = cert.Subject.CommonName } return tls.X509KeyPair(certPEMBlock, keyPEMBlock) }) if hasNonEmptyCN { return nil, fmt.Errorf("cert has non empty Common Name (%s)", cn) } } return cfg, nil }
c174704
net.Listener { l := &tlsKeepaliveListener{} l.Listener = inner l.config = config return l }
c174705
return s.applyV2.QGet(r) case "SYNC": return s.applyV2.Sync(r) default: // This should never be reached, but just in case: return Response{Err: ErrUnknownMethod} } }
c174706
ac.AddCommand(newRoleListCommand()) ac.AddCommand(newRoleGrantPermissionCommand()) ac.AddCommand(newRoleRevokePermissionCommand()) return ac }
c174707
resp, err := mustClientFromCmd(cmd).Auth.RoleAdd(context.TODO(), args[0]) if err != nil { ExitWithError(ExitError, err) } display.RoleAdd(args[0], *resp) }
c174708
name as its argument")) } name := args[0] resp, err := mustClientFromCmd(cmd).Auth.RoleGet(context.TODO(), name) if err != nil { ExitWithError(ExitError, err) } display.RoleGet(name, *resp) }
c174709
rangeEnd := permRange(args[2:]) resp, err := mustClientFromCmd(cmd).Auth.RoleGrantPermission(context.TODO(), args[0], key, rangeEnd, perm) if err != nil { ExitWithError(ExitError, err) } display.RoleGrantPermission(args[0], *resp) }
c174710
its argument")) } key, rangeEnd := permRange(args[1:]) resp, err := mustClientFromCmd(cmd).Auth.RoleRevokePermission(context.TODO(), args[0], key, rangeEnd) if err != nil { ExitWithError(ExitError, err) } display.RoleRevokePermission(args[0], args[1], rangeEnd, *resp) }
c174711
{ return newCluster(t, &ClusterConfig{Size: size}) }
c174712
{ return newCluster(t, cfg) }
c174713
pScheme+"://"+ln.Addr().String()) } for _, ln := range m.ClientListeners { cm.ClientURLs = append(cm.ClientURLs, cScheme+"://"+ln.Addr().String()) } ms = append(ms, cm) } return ms }
c174714
for lead == 0 || !possibleLead[lead] { lead = 0 for _, m := range membs { select { case <-m.s.StopNotify(): continue default: } if lead != 0 && lead != m.s.Lead() { lead = 0 time.Sleep(10 * tickDuration) break } lead = m.s.Lead() } } for i, m := range membs { if uint64(m.s.ID()) == lead { return i } } return -1 }
c174715
default: } if m.s.Lead() != 0 { noLeader = false time.Sleep(10 * tickDuration) break } } } }
c174716
i := range membs { membs[i].ID = "" } return reflect.DeepEqual(membs, wmembs) }
c174717
} m.grpcBridge, err = newBridge(m.grpcAddr) if err != nil { l.Close() return err } m.grpcAddr = schemeFromTLSInfo(m.ClientTLSInfo) + "://" + m.grpcBridge.inaddr m.grpcListener = l return nil }
c174718
if m.ClientTLSInfo != nil { tls, err := m.ClientTLSInfo.ClientConfig() if err != nil { return nil, err } cfg.TLS = tls } if m.DialOptions != nil { cfg.DialOptions = append(cfg.DialOptions, m.DialOptions...) } return newClientV3(cfg) }
c174719
err = types.NewURLs(peerURLStrs) if err != nil { // this should never fail panic(err) } clusterStr := m.InitialPeerURLsMap.String() mm.InitialPeerURLsMap, err = types.NewURLsMap(clusterStr) if err != nil { // this should never fail panic(err) } mm.InitialClusterToken = m.InitialClusterToken mm.ElectionTicks = m.ElectionTicks mm.PeerTLSInfo = m.PeerTLSInfo mm.ClientTLSInfo = m.ClientTLSInfo return mm }
c174720
= nil m.grpcServerPeer.Stop() m.grpcServerPeer.GracefulStop() m.grpcServerPeer = nil } m.s.HardStop() for _, f := range m.serverClosers { f() } }
c174721
member", zap.String("name", m.Name), zap.Strings("advertise-peer-urls", m.PeerURLs.StringSlice()), zap.Strings("listen-client-urls", m.ClientURLs.StringSlice()), zap.String("grpc-address", m.grpcAddr), ) }
c174722
* time.Millisecond for m.s.Lead() == 0 || (m.s.Lead() == oldLead) { time.Sleep(interval) } return m.s.Lead() }
c174723
!= nil { if err := m.listenGRPC(); err != nil { t.Fatal(err) } } err := m.Launch() lg.Info( "restarted a member", zap.String("name", m.Name), zap.Strings("advertise-peer-urls", m.PeerURLs.StringSlice()), zap.Strings("listen-client-urls", m.ClientURLs.StringSlice()), zap.String("grpc-address", m.grpcAddr), zap.Error(err), ) return err }
c174724
zap.String("name", m.Name), zap.Strings("advertise-peer-urls", m.PeerURLs.StringSlice()), zap.Strings("listen-client-urls", m.ClientURLs.StringSlice()), zap.String("grpc-address", m.grpcAddr), ) }
c174725
return "", rerr } lines := strings.Split(string(b), "\n") for _, l := range lines { if strings.HasPrefix(l, metricName) { return strings.Split(l, " ")[1], nil } } return "", nil }
c174726
m.s.CutPeer(other.s.ID()) other.s.CutPeer(m.s.ID()) } }
c174727
m.s.MendPeer(other.s.ID()) other.s.MendPeer(m.s.ID()) } }
c174728
clus := &ClusterV3{ cluster: NewClusterByConfig(t, cfg), } clus.Launch(t) if !cfg.SkipCreatingClient { for _, m := range clus.Members { client, err := NewClientV3(m) if err != nil { t.Fatalf("cannot create client: %v", err) } clus.clients = append(clus.clients, client) } } return clus }
c174729
"" { opts.TTL = DefaultTTL } return opts.Parse(optMap) }
c174730
if err != nil { return err } } // signing method is a required field method := optMap[optSignMethod] opts.SignMethod = jwt.GetSigningMethod(method) if opts.SignMethod == nil { return ErrInvalidAuthMethod } return nil }
c174731
case *jwt.SigningMethodHMAC: return opts.hmacKey() default: return nil, fmt.Errorf("unsupported signing method: %T", opts.SignMethod) } }
c174732
uint64(h.memberID) rh.RaftTerm = h.sg.Term() if rh.Revision == 0 { rh.Revision = h.rev() } }
c174733
// todo: fill in ClusterId // todo: fill in MemberId: Revision: w.nextrev, // todo: fill in RaftTerm: }, WatchId: w.id, Created: true, }) if !ok { return false } wb.receivers[w] = struct{}{} watchersCoalescing.Inc() return true }
c174734
ws.nextID++ } id = ws.nextID ws.nextID++ } else if _, ok := ws.watchers[id]; ok { return -1, ErrWatcherDuplicateID } w, c := ws.watchable.watch(key, end, startRev, id, ws.ch, fcs...) ws.cancels[id] = c ws.watchers[id] = w return id, nil }
c174735
return nil, err } return newEncoder(f, prevCrc, int(offset)), nil }
c174736
{ if lg != nil { lg.Warn("failed to unlock/close", zap.String("path", l.Name()), zap.Error(err)) } else { plog.Errorf("error unlocking %s when purging file (%v)", l.Name(), err) } errC <- err return } if lg != nil { lg.Info("purged", zap.String("path", f)) } else { plog.Infof("purged file %s successfully", f) } newfnames = newfnames[1:] } if purgec != nil { for i := 0; i < len(fnames)-len(newfnames); i++ { purgec <- fnames[i] } } select { case <-time.After(interval): case <-stop: return } } }() return errC }
c174737
= strings.Split(s, ",") return nil }
c174738
ss = new(StringsValue) if err := ss.Set(s); err != nil { plog.Panicf("new StringsValue should never fail: %v", err) } return ss }
c174739
[]string(*fs.Lookup(flagName).Value.(*StringsValue)) }
c174740
return v } return fmt.Sprintf("%s.%s", vs[0], vs[1]) }
c174741
make([]byte, defaultBufferBytes+pageBytes), bufWatermarkBytes: defaultBufferBytes, } }
c174742
elem = l.PushBack(w) } else { // create a new list and add the new watcher l = list.New() elem = l.PushBack(w) wh.watchers[key] = l } w.remove = func() { if w.removed { // avoid removing it twice return } w.removed = true l.Remove(elem) atomic.AddInt64(&wh.count, -1) reportWatcherRemoved() if l.Len() == 0 { delete(wh.watchers, key) } } atomic.AddInt64(&wh.count, 1) reportWatcherAdded() return w, nil }
c174743
notify the watchers // if the path is "/foo/bar", it will notify watchers with path "/", // "/foo" and "/foo/bar" for _, segment := range segments { currPath = path.Join(currPath, segment) // notify the watchers who interests in the changes of current path wh.notifyWatchers(e, currPath, false) } }
c174744
return &watcherHub{ EventHistory: clonedHistory, } }
c174745
if len(watchPath) > len(keyPath) { return false } // if watch path is just a "/", after path will start without "/" // add a "/" to deal with the special case when watchPath is "/" afterPath := path.Clean("/" + keyPath[len(watchPath):]) return strings.Contains(afterPath, "/_") }
c174746
err } srv.lg.Info("created etcd log file", zap.String("path", srv.Member.Etcd.LogOutputs[0])) return nil }
c174747
if err != nil { return err } return perr } select { case <-srv.etcdServer.Server.ReadyNotify(): srv.lg.Info("embedded etcd is ready") case <-time.After(time.Minute): srv.etcdServer.Close() return fmt.Errorf("took too long to start %v", <-srv.etcdServer.Err()) } return <-errc }
c174748
:= srv.etcdCmd.Process.Wait() errc <- ew close(errc) }() select { case <-time.After(5 * time.Second): srv.etcdCmd.Process.Kill() case e := <-errc: return e } err = <-errc srv.lg.Info( "stopped etcd command", zap.String("command-path", srv.etcdCmd.Path), zap.String("signal", sig.String()), zap.Error(err), ) return err } srv.lg.Info("stopping embedded etcd") srv.etcdServer.Server.HardStop() srv.etcdServer.Close() srv.lg.Info("stopped embedded etcd") return nil }
c174749
else { srv.etcdLogFile.Sync() srv.etcdLogFile.Close() } err = os.RemoveAll(srv.Member.BaseDir) if err != nil { return nil, err } srv.lg.Info("removed base directory", zap.String("dir", srv.Member.BaseDir)) // stop agent server srv.Stop() return &rpcpb.Response{ Success: true, Status: "destroyed etcd and agent", }, nil }
c174750
{ return &limitListener{l, make(chan struct{}, n)} }
c174751
{ return true } } w.Header().Set("Allow", strings.Join(ms, ",")) http.Error(w, "Method Not Allowed", http.StatusMethodNotAllowed) return false }
c174752
int(s.Cfg.MaxRequestBytes + grpcOverheadBytes), sg: s, watchable: s.Watchable(), ag: s, } }
c174753
case pb.WatchCreateRequest_NODELETE: filters = append(filters, filterNoDelete) default: } } return filters }
c174754
t.Logger, localID: t.ID, tr: t, r: r, cid: cid, } }
c174755
!= cid.String() { if lg != nil { lg.Warn( "request cluster ID mismatch", zap.String("local-member-id", localID.String()), zap.String("local-member-cluster-id", cid.String()), zap.String("local-member-server-version", localVs), zap.String("local-member-server-minimum-cluster-version", localMinClusterVs), zap.String("remote-peer-server-name", remoteName), zap.String("remote-peer-server-version", remoteVs), zap.String("remote-peer-server-minimum-cluster-version", remoteMinClusterVs), zap.String("remote-peer-cluster-id", gcid), ) } else { plog.Errorf("request cluster ID mismatch (got %s want %s)", gcid, cid) } return errClusterIDMismatch } return nil }
c174756
{ return clientv3.Compare(clientv3.Version(key), ">", 0) }
c174757
{ return clientv3.Compare(clientv3.Version(key), "=", 0) }
c174758
= append(errs, fmt.Sprintf("%q failed to dial (%v)", ep, cerr)) continue } conn.Close() endpoints = append(endpoints, ep) } if len(errs) != 0 { err = fmt.Errorf("%s", strings.Join(errs, ",")) } return endpoints, err }
c174759
!= nil { return 0, err } if !txnresp.Succeeded { return 0, ErrKeyExists } return txnresp.Header.Revision, nil }
c174760
return newUniqueEphemeralKV(s, prefix, "") }
c174761
}, Action: func(c *cli.Context) error { updatedirCommandFunc(c, mustNewKeyAPI(c)) return nil }, } }
c174762
resp, err := ki.Set(ctx, key, "", &client.SetOptions{TTL: time.Duration(ttl) * time.Second, Dir: true, PrevExist: client.PrevExist}) cancel() if err != nil { handleError(c, ExitServerError, err) } if c.GlobalString("output") != "simple" { printResponseKey(resp, c.GlobalString("output")) } }
c174763
ents := loadWAL(srcWAL, walsnap, withV3) saveDB(filepath.Join(destSnap, "db"), filepath.Join(srcSnap, "db"), state.Commit, withV3) idgen := idutil.NewGenerator(0, time.Now()) metadata.NodeID = idgen.Next() metadata.ClusterID = idgen.Next() neww, err := wal.Create(zap.NewExample(), destWAL, pbutil.MustMarshal(&metadata)) if err != nil { log.Fatal(err) } defer neww.Close() if err := neww.Save(state, ents); err != nil { log.Fatal(err) } if err := neww.SaveSnapshot(walsnap); err != nil { log.Fatal(err) } return nil }
c174764
{ log.Fatal(err) } // remove membership information; should be clobbered by --force-new-cluster for _, bucket := range []string{"members", "members_removed", "cluster"} { tx.DeleteBucket([]byte(bucket)) } // update consistent index to match hard state if !v3 { idxBytes := make([]byte, 8) binary.BigEndian.PutUint64(idxBytes, idx) b, err := tx.CreateBucketIfNotExists([]byte("meta")) if err != nil { log.Fatal(err) } b.Put([]byte("consistent_index"), idxBytes) } if err := tx.Commit(); err != nil { log.Fatal(err) } if err := db.Close(); err != nil { log.Fatal(err) } }
c174765
use") cmd.Flags().IntVar(&watchPerPrefix, "watch-per-prefix", 10, "number of watchers per prefix") cmd.Flags().IntVar(&totalKeys, "total-keys", 1000, "total number of keys to watch") return cmd }
c174766
== nil { lg = zap.NewExample() } return &v3Manager{lg: lg} }
c174767
return err } if err = fileutil.Fsync(f); err != nil { return err } if err = f.Close(); err != nil { return err } s.lg.Info( "fetched snapshot", zap.String("endpoint", cfg.Endpoints[0]), zap.Duration("took", time.Since(now)), ) if err = os.Rename(partpath, dbPath); err != nil { return fmt.Errorf("could not rename %s to %s (%v)", partpath, dbPath, err) } s.lg.Info("saved", zap.String("path", dbPath)) return nil }
c174768
hash of bucket %s", string(next)) } h.Write(next) iskeyb := (string(next) == "key") b.ForEach(func(k, v []byte) error { h.Write(k) h.Write(v) if iskeyb { rev := bytesToRev(k) ds.Revision = rev.main } ds.TotalKey++ return nil }) } return nil }); err != nil { return ds, err } ds.Hash = h.Sum32() return ds, nil }
c174769
walDir s.snapDir = filepath.Join(dataDir, "member", "snap") s.skipHashCheck = cfg.SkipHashCheck s.lg.Info( "restoring snapshot", zap.String("path", s.dbPath), zap.String("wal-dir", s.walDir), zap.String("data-dir", dataDir), zap.String("snap-dir", s.snapDir), ) if err = s.saveDB(); err != nil { return err } if err = s.saveWALAndSnap(); err != nil { return err } s.lg.Info( "restored snapshot", zap.String("path", s.dbPath), zap.String("wal-dir", s.walDir), zap.String("data-dir", dataDir), zap.String("snap-dir", s.snapDir), ) return nil }
c174770
enableFlagKey, nil, 0) if len(vs) == 1 { if bytes.Equal(vs[0], authEnabled) { enabled = true } } as := &authStore{ revision: getRevision(tx), lg: lg, be: be, enabled: enabled, rangePermCache: make(map[string]*unifiedRangePermissions), tokenProvider: tp, bcryptCost: bcryptCost, } if enabled { as.tokenProvider.enable() } if as.Revision() == 0 { as.commitRevision(tx) } tx.Unlock() be.ForceCommit() return as }
c174771
"": return newTokenProviderNop() default: if lg != nil { lg.Warn( "unknown token type", zap.String("type", tokenType), zap.Error(ErrInvalidAuthOpts), ) } else { plog.Errorf("unknown token type: %s", tokenType) } return nil, ErrInvalidAuthOpts } }
c174772
if pok { p.(Pausable).Resume() } if gok { g.Resume() } }
c174773
t.pipelineProber.Remove(id.String()) t.streamProber.Remove(id.String()) if t.Logger != nil { t.Logger.Info( "removed remote peer", zap.String("local-member-id", t.ID.String()), zap.String("removed-remote-peer-id", id.String()), ) } else { plog.Infof("removed peer %s", id) } }
c174774
if !p.activeSince().IsZero() { cnt++ } } return cnt }
c174775
Try as a DNS name. ipss, err := net.DefaultResolver.LookupIPAddr(ctx, host) if err != nil { return nil, err } ips = ipss } // randomize? ip := ips[0] return &net.TCPAddr{IP: ip.IP, Port: portnum, Zone: ip.Zone}, nil }
c174776
for i, u := range nus { h, err := resolveURL(ctx, lg, u) if err != nil { return nil, fmt.Errorf("failed to resolve %q (%v)", u.String(), err) } if h != "" { nus[i].Host = h } } newurls = append(newurls, nus) } return newurls, nil }
c174777
{ if !reflect.DeepEqual(a[i], b[i]) { return false, fmt.Errorf("%q(resolved from %q) != %q(resolved from %q)", a[i].String(), preva[i].String(), b[i].String(), prevb[i].String(), ) } } return true, nil }
c174778
u, err := url.Parse(str) if err != nil { return false, fmt.Errorf("failed to parse %q", str) } urlsB = append(urlsB, *u) } if lg == nil { lg, _ = zap.NewProduction() if lg == nil { lg = zap.NewExample() } } return urlsEqual(ctx, lg, urlsA, urlsB) }
c174779
lc.AddCommand(NewLeaseRevokeCommand()) lc.AddCommand(NewLeaseTimeToLiveCommand()) lc.AddCommand(NewLeaseListCommand()) lc.AddCommand(NewLeaseKeepAliveCommand()) return lc }
c174780
Short: "Creates leases", Run: leaseGrantCommandFunc, } return lc }
c174781
ctx, cancel := commandCtx(cmd) resp, err := mustClientFromCmd(cmd).Grant(ctx, ttl) cancel() if err != nil { ExitWithError(ExitError, fmt.Errorf("failed to grant lease (%v)", err)) } display.Grant(*resp) }
c174782
"Revokes leases", Run: leaseRevokeCommandFunc, } return lc }
c174783
cancel() if err != nil { ExitWithError(ExitError, fmt.Errorf("failed to revoke lease (%v)", err)) } display.Revoke(id, *resp) }
c174784
Run: leaseTimeToLiveCommandFunc, } lc.Flags().BoolVar(&timeToLiveKeys, "keys", false, "Get keys attached to this lease") return lc }
c174785
if timeToLiveKeys { opts = append(opts, v3.WithAttachedKeys()) } resp, rerr := mustClientFromCmd(cmd).TimeToLive(context.TODO(), leaseFromArgs(args[0]), opts...) if rerr != nil { ExitWithError(ExitBadConnection, rerr) } display.TimeToLive(*resp, timeToLiveKeys) }
c174786
"List all active leases", Run: leaseListCommandFunc, } return lc }
c174787
if rerr != nil { ExitWithError(ExitBadConnection, rerr) } display.Leases(*resp) }
c174788
lc.Flags().BoolVar(&leaseKeepAliveOnce, "once", false, "Resets the keep-alive time to its original value and exits immediately") return lc }
c174789
if kerr != nil { ExitWithError(ExitBadConnection, kerr) } display.KeepAlive(*respc) return } respc, kerr := mustClientFromCmd(cmd).KeepAlive(context.TODO(), id) if kerr != nil { ExitWithError(ExitBadConnection, kerr) } for resp := range respc { display.KeepAlive(*resp) } if _, ok := (display).(*simplePrinter); ok { fmt.Printf("lease %016x expired or revoked.\n", id) } }
c174790
ac.AddCommand(NewAlarmDisarmCommand()) ac.AddCommand(NewAlarmListCommand()) return ac }
c174791
commandCtx(cmd) resp, err := mustClientFromCmd(cmd).AlarmDisarm(ctx, &v3.AlarmMember{}) cancel() if err != nil { ExitWithError(ExitError, err) } display.Alarm(*resp) }
c174792
commandCtx(cmd) resp, err := mustClientFromCmd(cmd).AlarmList(ctx) cancel() if err != nil { ExitWithError(ExitError, err) } display.Alarm(*resp) }
c174793
sl := make([]string, n) for i := 0; i < n; i++ { sl[i] = fv.Index(i).String() } sv = strings.Join(sl, ",") case reflect.Int64: sv = fmt.Sprintf("%d", fv.Int()) case reflect.Bool: sv = fmt.Sprintf("%v", fv.Bool()) default: panic(fmt.Errorf("field %q (%v) cannot be parsed", name, fv.Type().Kind())) } fname := field.Tag.Get("yaml") // TODO: remove this if fname == "initial-corrupt-check" { fname = "experimental-" + fname } if sv != "" { fs = append(fs, fmt.Sprintf("--%s=%s", fname, sv)) } } return fs }
c174794
CertFile: e.PeerCertFile, KeyFile: e.PeerKeyFile, TrustedCAFile: e.PeerTrustedCAFile, } cfg.InitialCluster = e.InitialCluster cfg.ClusterState = e.InitialClusterState cfg.InitialClusterToken = e.InitialClusterToken cfg.SnapshotCount = uint64(e.SnapshotCount) cfg.QuotaBackendBytes = e.QuotaBackendBytes cfg.PreVote = e.PreVote cfg.ExperimentalInitialCorruptCheck = e.InitialCorruptCheck cfg.Logger = e.Logger cfg.LogOutputs = e.LogOutputs cfg.Debug = e.Debug return cfg, nil }
c174795
pprof.Handler("heap") m[HTTPPrefixPProf+"/goroutine"] = pprof.Handler("goroutine") m[HTTPPrefixPProf+"/threadcreate"] = pprof.Handler("threadcreate") m[HTTPPrefixPProf+"/block"] = pprof.Handler("block") m[HTTPPrefixPProf+"/mutex"] = pprof.Handler("mutex") return m }
c174796
zap.Int64("quota-size-bytes", s.Cfg.QuotaBackendBytes), zap.String("quota-size", humanize.Bytes(uint64(s.Cfg.QuotaBackendBytes))), zap.Int64("quota-maximum-size-bytes", MaxQuotaBytes), zap.String("quota-maximum-size", maxQuotaSize), ) } else { plog.Warningf("backend quota %v exceeds maximum recommended quota %v", s.Cfg.QuotaBackendBytes, MaxQuotaBytes) } } if lg != nil { lg.Info( "enabled backend quota", zap.String("quota-name", name), zap.Int64("quota-size-bytes", s.Cfg.QuotaBackendBytes), zap.String("quota-size", humanize.Bytes(uint64(s.Cfg.QuotaBackendBytes))), ) } }) return &backendQuota{s, s.Cfg.QuotaBackendBytes} }
c174797
} donec := make(chan struct{}) if advaddr != "" && prefix != "" { go func() { defer close(donec) cp.resolve(prefix) }() return cp, donec } close(donec) return cp, donec }
c174798
return &leaseHandler{l, waitch} }
c174799
if resp.StatusCode == http.StatusNotFound { return nil, lease.ErrLeaseNotFound } if resp.StatusCode != http.StatusOK { return nil, fmt.Errorf("lease: unknown error(%s)", string(b)) } lresp := &leasepb.LeaseInternalResponse{} if err := lresp.Unmarshal(b); err != nil { return nil, fmt.Errorf(`lease: %v. data = "%s"`, err, string(b)) } if lresp.LeaseTimeToLiveResponse.ID != int64(id) { return nil, fmt.Errorf("lease: renew id mismatch") } return lresp, nil }