id
stringlengths 2
7
| text
stringlengths 17
51.2k
| title
stringclasses 1
value |
|---|---|---|
c2700
|
{
s.EnableIntegration = &v
return s
}
| |
c2701
|
s.ResourceOwningAccountId = &v
return s
}
| |
c2702
|
{
s.LicenseConfigurationStatus = &v
return s
}
| |
c2703
|
[]*LicenseSpecification) *UpdateLicenseSpecificationsForResourceInput {
s.AddLicenseSpecifications = v
return s
}
| |
c2704
|
[]*LicenseSpecification) *UpdateLicenseSpecificationsForResourceInput {
s.RemoveLicenseSpecifications = v
return s
}
| |
c2705
|
string) *CloudWatchLogsDestination {
s.LogGroupArn = &v
return s
}
| |
c2706
|
string) *KinesisFirehoseDestination {
s.DeliveryStreamArn = &v
return s
}
| |
c2707
|
string) *SendVoiceMessageInput {
s.CallerId = &v
return s
}
| |
c2708
|
s.OriginationPhoneNumber = &v
return s
}
| |
c2709
|
*VoiceMessageContent {
s.CallInstructionsMessage = v
return s
}
| |
c2710
|
*VoiceMessageContent {
s.PlainTextMessage = v
return s
}
| |
c2711
|
*VoiceMessageContent {
s.SSMLMessage = v
return s
}
| |
c2712
|
return Defaults{
Config: cfg,
Handlers: handlers,
}
}
| |
c2713
|
handlers.Build.AfterEachFn = request.HandlerListStopOnError
handlers.Sign.PushBackNamed(corehandlers.BuildContentLengthHandler)
handlers.Send.PushBackNamed(corehandlers.ValidateReqSigHandler)
handlers.Send.PushBackNamed(corehandlers.SendHandler)
handlers.AfterRetry.PushBackNamed(corehandlers.AfterRetryHandler)
handlers.ValidateResponse.PushBackNamed(corehandlers.ValidateResponseHandler)
return handlers
}
| |
c2714
|
VerboseErrors: aws.BoolValue(cfg.CredentialsChainVerboseErrors),
Providers: CredProviders(cfg, handlers),
})
}
| |
c2715
|
fmt.Sprintf("%s%s", shareddefaults.ECSContainerCredentialsURI, uri)
return httpCredProvider(cfg, handlers, u)
}
return ec2RoleProvider(cfg, handlers)
}
| |
c2716
|
out := c.GetObjectRequest(input)
return out, req.Send()
}
| |
c2717
|
buildAny(reflect.ValueOf(v), &buf, "")
return buf.Bytes(), err
}
| |
c2718
|
return path.Join(a.BaseImportPath, a.PackageName())
}
| |
c2719
|
for i := 0; i < len(runes); i++ {
if r := runes[i]; !(unicode.IsNumber(r) || unicode.IsLetter(r)) {
runes[i] = ' '
}
}
name = string(runes)
// Title case name so its readable as a symbol.
name = strings.Title(name)
// Strip out spaces.
name = strings.Replace(name, " ", "", -1)
a.name = name
return a.name
}
| |
c2720
|
return a.Metadata.ServiceAbbreviation
}
return a.Metadata.ServiceFullName
}
| |
c2721
|
return "ec2query"
default:
return strings.Replace(a.Metadata.Protocol, "-", "", -1)
}
}
| |
c2722
|
names[i] = n
i++
}
sort.Strings(names)
return names
}
| |
c2723
|
len(a.Operations))
for i, n := range a.OperationNames() {
list[i] = a.Operations[n]
}
return list
}
| |
c2724
|
if op.OutputRef.Shape.Placeholder {
return true
}
}
return false
}
| |
c2725
|
names[i] = n
i++
}
sort.Strings(names)
return names
}
| |
c2726
|
// Ignore non-eventstream exception shapes in list.
if s := a.Shapes[n]; !(s.Exception && len(s.EventFor) == 0) {
list = append(list, s)
}
}
return list
}
| |
c2727
|
if s := a.Shapes[n]; s.Exception {
list = append(list, s)
}
}
return list
}
| |
c2728
|
+= fmt.Sprintf("\t%q\n", i)
}
if len(corePkgs) > 0 {
code += "\n"
}
for _, i := range extPkgs {
code += fmt.Sprintf("\t%q\n", i)
}
code += ")\n\n"
return code
}
| |
c2729
|
error {
a.imports[v] = true
return nil
}
| |
c2730
|
append(e, v...)
a.imports[path.Join(e...)] = true
return nil
}
| |
c2731
|
panic(err)
}
code := a.importsGoCode() + strings.TrimSpace(buf.String())
return code
}
| |
c2732
|
}
if !HasCrosslinks(strings.ToLower(ServiceIDFromUID(uid))) {
return ""
}
return strings.Join(append([]string{baseURL, "goto", "WebAPI", uid}, params...), "/")
}
| |
c2733
|
is found, e.g. es-2017-11-11
if found == 3 {
break
}
}
return uid[0:i]
}
| |
c2734
|
name = serviceIDRegex.ReplaceAllString(name, "")
name = prefixDigitRegex.ReplaceAllString(name, "")
name = strings.TrimSpace(name)
return name
}
| |
c2735
|
err := tplServiceDoc.Execute(&buf, a); err != nil {
panic(err)
}
return buf.String()
}
| |
c2736
|
!= nil {
a.AddSDKImport("aws/crr")
}
var buf bytes.Buffer
err := tplService.Execute(&buf, a)
if err != nil {
panic(err)
}
code := a.importsGoCode() + buf.String()
return code
}
| |
c2737
|
}
}
code := fmt.Sprintf("import (\n%q\n%q\n%q\n\n%q\n%q\n%q\n",
"bytes",
"fmt",
"time",
SDKImportRoot+"/aws",
SDKImportRoot+"/aws/session",
a.ImportPath(),
)
for k := range imports {
code += fmt.Sprintf("%q\n", k)
}
code += ")\n\n"
code += "var _ time.Duration\nvar _ bytes.Buffer\n\n"
code += strings.Join(exs, "\n\n")
return code
}
| |
c2738
|
fmt.Sprintf("%s.New(%s)", a.PackageName(), cfg)
}
| |
c2739
|
resolveShapeValidations(o.InputRef.Shape)
}
}
| |
c2740
|
is a grab bag we will just continue since
// we can't validate because we don't know the valued shape.
if ref.JSONValue {
continue
}
nestedShape := ref.Shape.NestedShape()
var v *ShapeValidation
if len(nestedShape.Validations) > 0 {
v = &ShapeValidation{
Name: name, Ref: ref, Type: ShapeValidationNested,
}
} else {
resolveShapeValidations(nestedShape, ancestry...)
if len(nestedShape.Validations) > 0 {
v = &ShapeValidation{
Name: name, Ref: ref, Type: ShapeValidationNested,
}
}
}
if v != nil && !s.Validations.Has(v.Ref, v.Type) {
s.Validations = append(s.Validations, *v)
}
}
ancestry = ancestry[:len(ancestry)-1]
}
| |
c2741
|
&s.KeyRef, &s.ValueRef} {
if ref.Shape == nil {
continue
}
a.removeShapeRef(ref)
*ref = ShapeRef{}
}
}
| |
c2742
|
if len(ref.Shape.refs) == 0 {
a.removeShape(ref.Shape)
}
}
| |
c2743
|
{
s.DownloadUri = &v
return s
}
| |
c2744
|
string) *ListTranscriptionJobsInput {
s.JobNameContains = &v
return s
}
| |
c2745
|
[]*TranscriptionJobSummary) *ListTranscriptionJobsOutput {
s.TranscriptionJobSummaries = v
return s
}
| |
c2746
|
{
s.StateEquals = &v
return s
}
| |
c2747
|
[]*VocabularyInfo) *ListVocabulariesOutput {
s.Vocabularies = v
return s
}
| |
c2748
|
s.MediaFileUri = &v
return s
}
| |
c2749
|
s.ChannelIdentification = &v
return s
}
| |
c2750
|
s.MaxSpeakerLabels = &v
return s
}
| |
c2751
|
s.ShowSpeakerLabels = &v
return s
}
| |
c2752
|
string) *StartTranscriptionJobInput {
s.OutputBucketName = &v
return s
}
| |
c2753
|
s.TranscriptFileUri = &v
return s
}
| |
c2754
|
{
s.Transcript = v
return s
}
| |
c2755
|
{
s.OutputLocationType = &v
return s
}
| |
c2756
|
cfg.Retryer = retryer
return cfg
}
| |
c2757
|
return isCodeRetryable(aerr.Code()) || isNestedErrorRetryable(aerr)
}
}
return false
}
| |
c2758
|
isCodeThrottle(aerr.Code())
}
}
return false
}
| |
c2759
|
isCodeExpiredCreds(aerr.Code())
}
}
return false
}
| |
c2760
|
p := &EC2RoleProvider{
Client: ec2metadata.New(c),
}
for _, option := range options {
option(p)
}
return credentials.NewCredentials(p)
}
| |
c2761
|
p := &EC2RoleProvider{
Client: client,
}
for _, option := range options {
option(p)
}
return credentials.NewCredentials(p)
}
| |
c2762
|
Role list", nil)
}
credsName := credsList[0]
roleCreds, err := requestCred(m.Client, credsName)
if err != nil {
return credentials.Value{ProviderName: ProviderName}, err
}
m.SetExpiration(roleCreds.Expiration, m.ExpiryWindow)
return credentials.Value{
AccessKeyID: roleCreds.AccessKeyID,
SecretAccessKey: roleCreds.SecretAccessKey,
SessionToken: roleCreds.Token,
ProviderName: ProviderName,
}, nil
}
| |
c2763
|
credsList = append(credsList, s.Text())
}
if err := s.Err(); err != nil {
return nil, awserr.New("SerializationError", "failed to read EC2 instance role from metadata service", err)
}
return credsList, nil
}
| |
c2764
|
%s EC2 instance role credentials", credsName),
err)
}
if respCreds.Code != "Success" {
// If an error code was returned something failed requesting the role.
return ec2RoleCredRespBody{}, awserr.New(respCreds.Code, respCreds.Message, nil)
}
return respCreds, nil
}
| |
c2765
|
c.WaitUntilDeploymentSuccessfulWithContext(aws.BackgroundContext(), input)
}
| |
c2766
|
*GetProductsOutput {
s.PriceList = v
return s
}
| |
c2767
|
(*waf.CreateRegexMatchSetOutput, error) {
req, out := c.CreateRegexMatchSetRequest(input)
return out, req.Send()
}
| |
c2768
|
*waf.WebACLSummary) *GetWebACLForResourceOutput {
s.WebACLSummary = v
return s
}
| |
c2769
|
c.WaitUntilGroupExistsWithContext(aws.BackgroundContext(), input)
}
| |
c2770
|
c.WaitUntilGroupInServiceWithContext(aws.BackgroundContext(), input)
}
| |
c2771
|
c.WaitUntilGroupNotExistsWithContext(aws.BackgroundContext(), input)
}
| |
c2772
|
*BatchPutMessageOutput {
s.BatchPutMessageErrorEntries = v
return s
}
| |
c2773
|
*ContainerDatasetAction {
s.ResourceConfiguration = v
return s
}
| |
c2774
|
{
s.DatasetArn = &v
return s
}
| |
c2775
|
{
s.DatastoreArn = &v
return s
}
| |
c2776
|
*DatasetAction {
s.ContainerAction = v
return s
}
| |
c2777
|
*DatasetAction {
s.QueryAction = v
return s
}
| |
c2778
|
*DatasetContentDeliveryDestination {
s.IotEventsDestinationConfiguration = v
return s
}
| |
c2779
|
time.Time) *DatasetContentSummary {
s.ScheduleTime = &v
return s
}
| |
c2780
|
s.DataURI = &v
return s
}
| |
c2781
|
s.OffsetSeconds = &v
return s
}
| |
c2782
|
s.TimeExpression = &v
return s
}
| |
c2783
|
time.Time) *EstimatedResourceSize {
s.EstimatedOn = &v
return s
}
| |
c2784
|
s.EstimatedSizeInBytes = &v
return s
}
| |
c2785
|
s.LambdaName = &v
return s
}
| |
c2786
|
[]*ChannelSummary) *ListChannelsOutput {
s.ChannelSummaries = v
return s
}
| |
c2787
|
time.Time) *ListDatasetContentsInput {
s.ScheduledBefore = &v
return s
}
| |
c2788
|
{
s.ScheduledOnOrAfter = &v
return s
}
| |
c2789
|
[]*DatasetContentSummary) *ListDatasetContentsOutput {
s.DatasetContentSummaries = v
return s
}
| |
c2790
|
[]*DatasetSummary) *ListDatasetsOutput {
s.DatasetSummaries = v
return s
}
| |
c2791
|
[]*DatastoreSummary) *ListDatastoresOutput {
s.DatastoreSummaries = v
return s
}
| |
c2792
|
[]*PipelineSummary) *ListPipelinesOutput {
s.PipelineSummaries = v
return s
}
| |
c2793
|
*PipelineActivity {
s.AddAttributes = v
return s
}
| |
c2794
|
*PipelineActivity {
s.DeviceRegistryEnrich = v
return s
}
| |
c2795
|
*PipelineActivity {
s.DeviceShadowEnrich = v
return s
}
| |
c2796
|
*PipelineActivity {
s.RemoveAttributes = v
return s
}
| |
c2797
|
*PipelineActivity {
s.SelectAttributes = v
return s
}
| |
c2798
|
s.DeltaTime = v
return s
}
| |
c2799
|
s.NumberOfDays = &v
return s
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.