[lxc-devel] [lxd/master] Unexport some functions in main package

tomponline on Github lxc-bot at linuxcontainers.org
Mon Mar 16 17:03:36 UTC 2020


A non-text attachment was scrubbed...
Name: not available
Type: text/x-mailbox
Size: 366 bytes
Desc: not available
URL: <http://lists.linuxcontainers.org/pipermail/lxc-devel/attachments/20200316/cec38f33/attachment-0001.bin>
-------------- next part --------------
From b155380992671d8b1f1e894fe065039a41e33992 Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:51:11 +0000
Subject: [PATCH 1/9] lxd: Unexport NewMigrationSource

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/instance_post.go     | 2 +-
 lxd/instance_snapshot.go | 2 +-
 lxd/migrate_instance.go  | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/lxd/instance_post.go b/lxd/instance_post.go
index 069c3ba0ef..66e6940549 100644
--- a/lxd/instance_post.go
+++ b/lxd/instance_post.go
@@ -206,7 +206,7 @@ func containerPost(d *Daemon, r *http.Request) response.Response {
 		}
 
 		instanceOnly := req.InstanceOnly || req.ContainerOnly
-		ws, err := NewMigrationSource(inst, stateful, instanceOnly)
+		ws, err := newMigrationSource(inst, stateful, instanceOnly)
 		if err != nil {
 			return response.InternalError(err)
 		}
diff --git a/lxd/instance_snapshot.go b/lxd/instance_snapshot.go
index c6d577f901..53b17b0868 100644
--- a/lxd/instance_snapshot.go
+++ b/lxd/instance_snapshot.go
@@ -358,7 +358,7 @@ func snapshotPost(d *Daemon, r *http.Request, sc instance.Instance, containerNam
 			}
 		}
 
-		ws, err := NewMigrationSource(sc, reqNew.Live, true)
+		ws, err := newMigrationSource(sc, reqNew.Live, true)
 		if err != nil {
 			return response.SmartError(err)
 		}
diff --git a/lxd/migrate_instance.go b/lxd/migrate_instance.go
index b7110c2776..32313d2378 100644
--- a/lxd/migrate_instance.go
+++ b/lxd/migrate_instance.go
@@ -31,7 +31,7 @@ import (
 	"github.com/lxc/lxd/shared/logger"
 )
 
-func NewMigrationSource(inst instance.Instance, stateful bool, instanceOnly bool) (*migrationSourceWs, error) {
+func newMigrationSource(inst instance.Instance, stateful bool, instanceOnly bool) (*migrationSourceWs, error) {
 	ret := migrationSourceWs{migrationFields{instance: inst}, make(chan bool, 1)}
 	ret.instanceOnly = instanceOnly
 

From 894cd8dcb65f2f06985181f7ae0605055cd9b55e Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:52:02 +0000
Subject: [PATCH 2/9] lxd: Unexport NewDaemon

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/daemon.go      | 4 ++--
 lxd/main_daemon.go | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/lxd/daemon.go b/lxd/daemon.go
index 9de17fb9e6..783ab7a3f1 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -146,7 +146,7 @@ func (m *IdentityClientWrapper) DeclaredIdentity(ctx context.Context, declared m
 }
 
 // NewDaemon returns a new Daemon object with the given configuration.
-func NewDaemon(config *DaemonConfig, os *sys.OS) *Daemon {
+func newDaemon(config *DaemonConfig, os *sys.OS) *Daemon {
 	lxdEvents := events.NewServer(daemon.Debug, daemon.Verbose)
 	devlxdEvents := events.NewServer(daemon.Debug, daemon.Verbose)
 
@@ -173,7 +173,7 @@ func DefaultDaemonConfig() *DaemonConfig {
 func DefaultDaemon() *Daemon {
 	config := DefaultDaemonConfig()
 	os := sys.DefaultOS()
-	return NewDaemon(config, os)
+	return newDaemon(config, os)
 }
 
 // APIEndpoint represents a URL in our API.
diff --git a/lxd/main_daemon.go b/lxd/main_daemon.go
index 69fddf8cd5..2680a12795 100644
--- a/lxd/main_daemon.go
+++ b/lxd/main_daemon.go
@@ -60,7 +60,7 @@ func (c *cmdDaemon) Run(cmd *cobra.Command, args []string) error {
 	conf := DefaultDaemonConfig()
 	conf.Group = c.flagGroup
 	conf.Trace = c.global.flagLogTrace
-	d := NewDaemon(conf, sys.DefaultOS())
+	d := newDaemon(conf, sys.DefaultOS())
 
 	err := d.Init()
 	if err != nil {

From 9595d4b5cc285a5fec4d6e04b3466739a48132bd Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:52:50 +0000
Subject: [PATCH 3/9] lxd: Unexport RestServer

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/api.go    | 5 ++---
 lxd/daemon.go | 2 +-
 2 files changed, 3 insertions(+), 4 deletions(-)

diff --git a/lxd/api.go b/lxd/api.go
index 8f5a8316d0..70438ca6a5 100644
--- a/lxd/api.go
+++ b/lxd/api.go
@@ -15,9 +15,8 @@ import (
 	"github.com/lxc/lxd/shared/logger"
 )
 
-// RestServer creates an http.Server capable of handling requests against the LXD REST
-// API endpoint.
-func RestServer(d *Daemon) *http.Server {
+// RestServer creates an http.Server capable of handling requests against the LXD REST API endpoint.
+func restServer(d *Daemon) *http.Server {
 	/* Setup the web server */
 	mux := mux.NewRouter()
 	mux.StrictSlash(false)
diff --git a/lxd/daemon.go b/lxd/daemon.go
index 783ab7a3f1..b2d8d2c5bb 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -724,7 +724,7 @@ func (d *Daemon) init() error {
 		Dir:                  d.os.VarDir,
 		UnixSocket:           d.UnixSocket(),
 		Cert:                 certInfo,
-		RestServer:           RestServer(d),
+		RestServer:           restServer(d),
 		DevLxdServer:         DevLxdServer(d),
 		LocalUnixSocketGroup: d.config.Group,
 		NetworkAddress:       address,

From 338cefaeb5d8f7a48fb7d2c95f081f2f9e5b8a5d Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:53:49 +0000
Subject: [PATCH 4/9] lxd: Unexport DefaultDaemonConfig and DefaultDaemon

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/daemon.go                | 8 ++++----
 lxd/main_activateifneeded.go | 2 +-
 lxd/main_daemon.go           | 2 +-
 3 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/lxd/daemon.go b/lxd/daemon.go
index b2d8d2c5bb..37db4f1146 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -161,8 +161,8 @@ func newDaemon(config *DaemonConfig, os *sys.OS) *Daemon {
 	}
 }
 
-// DefaultDaemonConfig returns a DaemonConfig object with default values/
-func DefaultDaemonConfig() *DaemonConfig {
+// DefaultDaemonConfig returns a DaemonConfig object with default values.
+func defaultDaemonConfig() *DaemonConfig {
 	return &DaemonConfig{
 		RaftLatency:        3.0,
 		DqliteSetupTimeout: 36 * time.Hour, // Account for snap refresh lag
@@ -170,8 +170,8 @@ func DefaultDaemonConfig() *DaemonConfig {
 }
 
 // DefaultDaemon returns a new, un-initialized Daemon object with default values.
-func DefaultDaemon() *Daemon {
-	config := DefaultDaemonConfig()
+func defaultDaemon() *Daemon {
+	config := defaultDaemonConfig()
 	os := sys.DefaultOS()
 	return newDaemon(config, os)
 }
diff --git a/lxd/main_activateifneeded.go b/lxd/main_activateifneeded.go
index 1322c12f4a..99331ead84 100644
--- a/lxd/main_activateifneeded.go
+++ b/lxd/main_activateifneeded.go
@@ -52,7 +52,7 @@ func (c *cmdActivateifneeded) Run(cmd *cobra.Command, args []string) error {
 	}
 
 	// Don't start a full daemon, we just need DB access
-	d := DefaultDaemon()
+	d := defaultDaemon()
 
 	// Check if either the local database or the legacy local database
 	// files exists.
diff --git a/lxd/main_daemon.go b/lxd/main_daemon.go
index 2680a12795..2f041a3c51 100644
--- a/lxd/main_daemon.go
+++ b/lxd/main_daemon.go
@@ -57,7 +57,7 @@ func (c *cmdDaemon) Run(cmd *cobra.Command, args []string) error {
 		}
 	}
 
-	conf := DefaultDaemonConfig()
+	conf := defaultDaemonConfig()
 	conf.Group = c.flagGroup
 	conf.Trace = c.global.flagLogTrace
 	d := newDaemon(conf, sys.DefaultOS())

From 0c0c0ffdbbfdbc8bd4e1c0b7eba31f9770ea536e Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:55:50 +0000
Subject: [PATCH 5/9] lxd: Unexports AllowAuthenticated and
 AllowProjectPermission

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/api_cluster.go              |  6 +--
 lxd/api_project.go              |  8 ++--
 lxd/certificates.go             |  4 +-
 lxd/daemon.go                   |  8 ++--
 lxd/events.go                   |  2 +-
 lxd/images.go                   | 32 ++++++++--------
 lxd/instance_logs.go            |  6 +--
 lxd/instances.go                | 68 ++++++++++++++++-----------------
 lxd/networks.go                 |  8 ++--
 lxd/operations.go               |  8 ++--
 lxd/profiles.go                 | 14 +++----
 lxd/resources.go                |  4 +-
 lxd/storage_pools.go            |  4 +-
 lxd/storage_volumes.go          | 48 +++++++++++------------
 lxd/storage_volumes_snapshot.go | 12 +++---
 15 files changed, 116 insertions(+), 116 deletions(-)

diff --git a/lxd/api_cluster.go b/lxd/api_cluster.go
index 2a668faab1..15b67a585a 100644
--- a/lxd/api_cluster.go
+++ b/lxd/api_cluster.go
@@ -32,21 +32,21 @@ import (
 var clusterCmd = APIEndpoint{
 	Path: "cluster",
 
-	Get: APIEndpointAction{Handler: clusterGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: clusterGet, AccessHandler: allowAuthenticated},
 	Put: APIEndpointAction{Handler: clusterPut},
 }
 
 var clusterNodesCmd = APIEndpoint{
 	Path: "cluster/members",
 
-	Get: APIEndpointAction{Handler: clusterNodesGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: clusterNodesGet, AccessHandler: allowAuthenticated},
 }
 
 var clusterNodeCmd = APIEndpoint{
 	Path: "cluster/members/{name}",
 
 	Delete: APIEndpointAction{Handler: clusterNodeDelete},
-	Get:    APIEndpointAction{Handler: clusterNodeGet, AccessHandler: AllowAuthenticated},
+	Get:    APIEndpointAction{Handler: clusterNodeGet, AccessHandler: allowAuthenticated},
 	Post:   APIEndpointAction{Handler: clusterNodePost},
 }
 
diff --git a/lxd/api_project.go b/lxd/api_project.go
index dc70c31d16..4630daf26c 100644
--- a/lxd/api_project.go
+++ b/lxd/api_project.go
@@ -26,7 +26,7 @@ var projectFeatures = []string{"features.images", "features.profiles", "features
 var projectsCmd = APIEndpoint{
 	Path: "projects",
 
-	Get:  APIEndpointAction{Handler: projectsGet, AccessHandler: AllowAuthenticated},
+	Get:  APIEndpointAction{Handler: projectsGet, AccessHandler: allowAuthenticated},
 	Post: APIEndpointAction{Handler: projectsPost},
 }
 
@@ -34,10 +34,10 @@ var projectCmd = APIEndpoint{
 	Path: "projects/{name}",
 
 	Delete: APIEndpointAction{Handler: projectDelete},
-	Get:    APIEndpointAction{Handler: projectGet, AccessHandler: AllowAuthenticated},
-	Patch:  APIEndpointAction{Handler: projectPatch, AccessHandler: AllowAuthenticated},
+	Get:    APIEndpointAction{Handler: projectGet, AccessHandler: allowAuthenticated},
+	Patch:  APIEndpointAction{Handler: projectPatch, AccessHandler: allowAuthenticated},
 	Post:   APIEndpointAction{Handler: projectPost},
-	Put:    APIEndpointAction{Handler: projectPut, AccessHandler: AllowAuthenticated},
+	Put:    APIEndpointAction{Handler: projectPut, AccessHandler: allowAuthenticated},
 }
 
 func projectsGet(d *Daemon, r *http.Request) response.Response {
diff --git a/lxd/certificates.go b/lxd/certificates.go
index bd18e8cee4..a236770bb1 100644
--- a/lxd/certificates.go
+++ b/lxd/certificates.go
@@ -28,7 +28,7 @@ import (
 var certificatesCmd = APIEndpoint{
 	Path: "certificates",
 
-	Get:  APIEndpointAction{Handler: certificatesGet, AccessHandler: AllowAuthenticated},
+	Get:  APIEndpointAction{Handler: certificatesGet, AccessHandler: allowAuthenticated},
 	Post: APIEndpointAction{Handler: certificatesPost, AllowUntrusted: true},
 }
 
@@ -36,7 +36,7 @@ var certificateCmd = APIEndpoint{
 	Path: "certificates/{fingerprint}",
 
 	Delete: APIEndpointAction{Handler: certificateDelete},
-	Get:    APIEndpointAction{Handler: certificateGet, AccessHandler: AllowAuthenticated},
+	Get:    APIEndpointAction{Handler: certificateGet, AccessHandler: allowAuthenticated},
 	Patch:  APIEndpointAction{Handler: certificatePatch},
 	Put:    APIEndpointAction{Handler: certificatePut},
 }
diff --git a/lxd/daemon.go b/lxd/daemon.go
index 37db4f1146..7e284c7661 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -201,16 +201,16 @@ type APIEndpointAction struct {
 	AllowUntrusted bool
 }
 
-// AllowAuthenticated is a AccessHandler which allows all requests.
+// allowAuthenticated is an AccessHandler which allows all requests.
 // This function doesn't do anything itself, except return the EmptySyncResponse that allows the request to
 // proceed. However in order to access any API route you must be authenticated, unless the handler's AllowUntrusted
 // property is set to true or you are an admin.
-func AllowAuthenticated(d *Daemon, r *http.Request) response.Response {
+func allowAuthenticated(d *Daemon, r *http.Request) response.Response {
 	return response.EmptySyncResponse
 }
 
-// AllowProjectPermission is a wrapper to check access against the project, its features and RBAC permission
-func AllowProjectPermission(feature string, permission string) func(d *Daemon, r *http.Request) response.Response {
+// allowProjectPermission is a wrapper to check access against the project, its features and RBAC permission
+func allowProjectPermission(feature string, permission string) func(d *Daemon, r *http.Request) response.Response {
 	return func(d *Daemon, r *http.Request) response.Response {
 		// Shortcut for speed
 		if d.userIsAdmin(r) {
diff --git a/lxd/events.go b/lxd/events.go
index e291f18da4..38b9760268 100644
--- a/lxd/events.go
+++ b/lxd/events.go
@@ -14,7 +14,7 @@ import (
 var eventsCmd = APIEndpoint{
 	Path: "events",
 
-	Get: APIEndpointAction{Handler: eventsGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: eventsGet, AccessHandler: allowAuthenticated},
 }
 
 type eventsServe struct {
diff --git a/lxd/images.go b/lxd/images.go
index bf3d166ad7..4ed760c364 100644
--- a/lxd/images.go
+++ b/lxd/images.go
@@ -52,16 +52,16 @@ var imagesCmd = APIEndpoint{
 	Path: "images",
 
 	Get:  APIEndpointAction{Handler: imagesGet, AllowUntrusted: true},
-	Post: APIEndpointAction{Handler: imagesPost, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Post: APIEndpointAction{Handler: imagesPost, AccessHandler: allowProjectPermission("images", "manage-images")},
 }
 
 var imageCmd = APIEndpoint{
 	Path: "images/{fingerprint}",
 
-	Delete: APIEndpointAction{Handler: imageDelete, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Delete: APIEndpointAction{Handler: imageDelete, AccessHandler: allowProjectPermission("images", "manage-images")},
 	Get:    APIEndpointAction{Handler: imageGet, AllowUntrusted: true},
-	Patch:  APIEndpointAction{Handler: imagePatch, AccessHandler: AllowProjectPermission("images", "manage-images")},
-	Put:    APIEndpointAction{Handler: imagePut, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Patch:  APIEndpointAction{Handler: imagePatch, AccessHandler: allowProjectPermission("images", "manage-images")},
+	Put:    APIEndpointAction{Handler: imagePut, AccessHandler: allowProjectPermission("images", "manage-images")},
 }
 
 var imageExportCmd = APIEndpoint{
@@ -73,30 +73,30 @@ var imageExportCmd = APIEndpoint{
 var imageSecretCmd = APIEndpoint{
 	Path: "images/{fingerprint}/secret",
 
-	Post: APIEndpointAction{Handler: imageSecret, AccessHandler: AllowProjectPermission("images", "view")},
+	Post: APIEndpointAction{Handler: imageSecret, AccessHandler: allowProjectPermission("images", "view")},
 }
 
 var imageRefreshCmd = APIEndpoint{
 	Path: "images/{fingerprint}/refresh",
 
-	Post: APIEndpointAction{Handler: imageRefresh, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Post: APIEndpointAction{Handler: imageRefresh, AccessHandler: allowProjectPermission("images", "manage-images")},
 }
 
 var imageAliasesCmd = APIEndpoint{
 	Path: "images/aliases",
 
-	Get:  APIEndpointAction{Handler: imageAliasesGet, AccessHandler: AllowProjectPermission("images", "view")},
-	Post: APIEndpointAction{Handler: imageAliasesPost, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Get:  APIEndpointAction{Handler: imageAliasesGet, AccessHandler: allowProjectPermission("images", "view")},
+	Post: APIEndpointAction{Handler: imageAliasesPost, AccessHandler: allowProjectPermission("images", "manage-images")},
 }
 
 var imageAliasCmd = APIEndpoint{
 	Path: "images/aliases/{name:.*}",
 
-	Delete: APIEndpointAction{Handler: imageAliasDelete, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Delete: APIEndpointAction{Handler: imageAliasDelete, AccessHandler: allowProjectPermission("images", "manage-images")},
 	Get:    APIEndpointAction{Handler: imageAliasGet, AllowUntrusted: true},
-	Patch:  APIEndpointAction{Handler: imageAliasPatch, AccessHandler: AllowProjectPermission("images", "manage-images")},
-	Post:   APIEndpointAction{Handler: imageAliasPost, AccessHandler: AllowProjectPermission("images", "manage-images")},
-	Put:    APIEndpointAction{Handler: imageAliasPut, AccessHandler: AllowProjectPermission("images", "manage-images")},
+	Patch:  APIEndpointAction{Handler: imageAliasPatch, AccessHandler: allowProjectPermission("images", "manage-images")},
+	Post:   APIEndpointAction{Handler: imageAliasPost, AccessHandler: allowProjectPermission("images", "manage-images")},
+	Put:    APIEndpointAction{Handler: imageAliasPut, AccessHandler: allowProjectPermission("images", "manage-images")},
 }
 
 /* We only want a single publish running at any one time.
@@ -943,7 +943,7 @@ func doImagesGet(d *Daemon, recursion bool, project string, public bool, clauses
 func imagesGet(d *Daemon, r *http.Request) response.Response {
 	project := projectParam(r)
 	filterStr := r.FormValue("filter")
-	public := d.checkTrustedClient(r) != nil || AllowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
+	public := d.checkTrustedClient(r) != nil || allowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
 
 	var clauses []filter.Clause
 	if filterStr != "" {
@@ -1537,7 +1537,7 @@ func imageValidSecret(fingerprint string, secret string) bool {
 func imageGet(d *Daemon, r *http.Request) response.Response {
 	project := projectParam(r)
 	fingerprint := mux.Vars(r)["fingerprint"]
-	public := d.checkTrustedClient(r) != nil || AllowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
+	public := d.checkTrustedClient(r) != nil || allowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
 	secret := r.FormValue("secret")
 
 	info, resp := doImageGet(d.cluster, project, fingerprint, false)
@@ -1737,7 +1737,7 @@ func imageAliasesGet(d *Daemon, r *http.Request) response.Response {
 func imageAliasGet(d *Daemon, r *http.Request) response.Response {
 	project := projectParam(r)
 	name := mux.Vars(r)["name"]
-	public := d.checkTrustedClient(r) != nil || AllowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
+	public := d.checkTrustedClient(r) != nil || allowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
 
 	_, alias, err := d.cluster.ImageAliasGet(project, name, !public)
 	if err != nil {
@@ -1885,7 +1885,7 @@ func imageExport(d *Daemon, r *http.Request) response.Response {
 	project := projectParam(r)
 	fingerprint := mux.Vars(r)["fingerprint"]
 
-	public := d.checkTrustedClient(r) != nil || AllowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
+	public := d.checkTrustedClient(r) != nil || allowProjectPermission("images", "view")(d, r) != response.EmptySyncResponse
 	secret := r.FormValue("secret")
 
 	var imgInfo *api.Image
diff --git a/lxd/instance_logs.go b/lxd/instance_logs.go
index 5edac53ff3..1fc437ab1d 100644
--- a/lxd/instance_logs.go
+++ b/lxd/instance_logs.go
@@ -24,8 +24,8 @@ var instanceLogCmd = APIEndpoint{
 		{Name: "vmLog", Path: "virtual-machines/{name}/logs/{file}"},
 	},
 
-	Delete: APIEndpointAction{Handler: containerLogDelete, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Get:    APIEndpointAction{Handler: containerLogGet, AccessHandler: AllowProjectPermission("containers", "view")},
+	Delete: APIEndpointAction{Handler: containerLogDelete, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Get:    APIEndpointAction{Handler: containerLogGet, AccessHandler: allowProjectPermission("containers", "view")},
 }
 
 var instanceLogsCmd = APIEndpoint{
@@ -36,7 +36,7 @@ var instanceLogsCmd = APIEndpoint{
 		{Name: "vmLogs", Path: "virtual-machines/{name}/logs"},
 	},
 
-	Get: APIEndpointAction{Handler: containerLogsGet, AccessHandler: AllowProjectPermission("containers", "view")},
+	Get: APIEndpointAction{Handler: containerLogsGet, AccessHandler: allowProjectPermission("containers", "view")},
 }
 
 func containerLogsGet(d *Daemon, r *http.Request) response.Response {
diff --git a/lxd/instances.go b/lxd/instances.go
index 7f9a93d7ad..b7f8366daf 100644
--- a/lxd/instances.go
+++ b/lxd/instances.go
@@ -25,8 +25,8 @@ var instancesCmd = APIEndpoint{
 		{Name: "vms", Path: "virtual-machines"},
 	},
 
-	Get:  APIEndpointAction{Handler: containersGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post: APIEndpointAction{Handler: containersPost, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
+	Get:  APIEndpointAction{Handler: containersGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post: APIEndpointAction{Handler: containersPost, AccessHandler: allowProjectPermission("containers", "manage-containers")},
 }
 
 var instanceCmd = APIEndpoint{
@@ -37,11 +37,11 @@ var instanceCmd = APIEndpoint{
 		{Name: "vm", Path: "virtual-machines/{name}"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Put:    APIEndpointAction{Handler: containerPut, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
-	Delete: APIEndpointAction{Handler: containerDelete, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
-	Post:   APIEndpointAction{Handler: containerPost, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
-	Patch:  APIEndpointAction{Handler: containerPatch, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
+	Get:    APIEndpointAction{Handler: containerGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Put:    APIEndpointAction{Handler: containerPut, AccessHandler: allowProjectPermission("containers", "manage-containers")},
+	Delete: APIEndpointAction{Handler: containerDelete, AccessHandler: allowProjectPermission("containers", "manage-containers")},
+	Post:   APIEndpointAction{Handler: containerPost, AccessHandler: allowProjectPermission("containers", "manage-containers")},
+	Patch:  APIEndpointAction{Handler: containerPatch, AccessHandler: allowProjectPermission("containers", "manage-containers")},
 }
 
 var instanceStateCmd = APIEndpoint{
@@ -52,8 +52,8 @@ var instanceStateCmd = APIEndpoint{
 		{Name: "vmState", Path: "virtual-machines/{name}/state"},
 	},
 
-	Get: APIEndpointAction{Handler: containerState, AccessHandler: AllowProjectPermission("containers", "view")},
-	Put: APIEndpointAction{Handler: containerStatePut, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get: APIEndpointAction{Handler: containerState, AccessHandler: allowProjectPermission("containers", "view")},
+	Put: APIEndpointAction{Handler: containerStatePut, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceFileCmd = APIEndpoint{
@@ -64,9 +64,9 @@ var instanceFileCmd = APIEndpoint{
 		{Name: "vmFile", Path: "virtual-machines/{name}/files"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerFileHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Post:   APIEndpointAction{Handler: containerFileHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Delete: APIEndpointAction{Handler: containerFileHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:    APIEndpointAction{Handler: containerFileHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Post:   APIEndpointAction{Handler: containerFileHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Delete: APIEndpointAction{Handler: containerFileHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceSnapshotsCmd = APIEndpoint{
@@ -77,8 +77,8 @@ var instanceSnapshotsCmd = APIEndpoint{
 		{Name: "vmSnapshots", Path: "virtual-machines/{name}/snapshots"},
 	},
 
-	Get:  APIEndpointAction{Handler: containerSnapshotsGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post: APIEndpointAction{Handler: containerSnapshotsPost, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:  APIEndpointAction{Handler: containerSnapshotsGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post: APIEndpointAction{Handler: containerSnapshotsPost, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceSnapshotCmd = APIEndpoint{
@@ -89,10 +89,10 @@ var instanceSnapshotCmd = APIEndpoint{
 		{Name: "vmSnapshot", Path: "virtual-machines/{name}/snapshots/{snapshotName}"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Post:   APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Delete: APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Put:    APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:    APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Post:   APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Delete: APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Put:    APIEndpointAction{Handler: containerSnapshotHandler, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceConsoleCmd = APIEndpoint{
@@ -103,9 +103,9 @@ var instanceConsoleCmd = APIEndpoint{
 		{Name: "vmConsole", Path: "virtual-machines/{name}/console"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerConsoleLogGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post:   APIEndpointAction{Handler: containerConsolePost, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Delete: APIEndpointAction{Handler: containerConsoleLogDelete, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:    APIEndpointAction{Handler: containerConsoleLogGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post:   APIEndpointAction{Handler: containerConsolePost, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Delete: APIEndpointAction{Handler: containerConsoleLogDelete, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceExecCmd = APIEndpoint{
@@ -116,7 +116,7 @@ var instanceExecCmd = APIEndpoint{
 		{Name: "vmExec", Path: "virtual-machines/{name}/exec"},
 	},
 
-	Post: APIEndpointAction{Handler: containerExecPost, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Post: APIEndpointAction{Handler: containerExecPost, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceMetadataCmd = APIEndpoint{
@@ -127,8 +127,8 @@ var instanceMetadataCmd = APIEndpoint{
 		{Name: "vmMetadata", Path: "virtual-machines/{name}/metadata"},
 	},
 
-	Get: APIEndpointAction{Handler: containerMetadataGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Put: APIEndpointAction{Handler: containerMetadataPut, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
+	Get: APIEndpointAction{Handler: containerMetadataGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Put: APIEndpointAction{Handler: containerMetadataPut, AccessHandler: allowProjectPermission("containers", "manage-containers")},
 }
 
 var instanceMetadataTemplatesCmd = APIEndpoint{
@@ -139,10 +139,10 @@ var instanceMetadataTemplatesCmd = APIEndpoint{
 		{Name: "vmMetadataTemplates", Path: "virtual-machines/{name}/metadata/templates"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerMetadataTemplatesGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post:   APIEndpointAction{Handler: containerMetadataTemplatesPostPut, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
-	Put:    APIEndpointAction{Handler: containerMetadataTemplatesPostPut, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
-	Delete: APIEndpointAction{Handler: containerMetadataTemplatesDelete, AccessHandler: AllowProjectPermission("containers", "manage-containers")},
+	Get:    APIEndpointAction{Handler: containerMetadataTemplatesGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post:   APIEndpointAction{Handler: containerMetadataTemplatesPostPut, AccessHandler: allowProjectPermission("containers", "manage-containers")},
+	Put:    APIEndpointAction{Handler: containerMetadataTemplatesPostPut, AccessHandler: allowProjectPermission("containers", "manage-containers")},
+	Delete: APIEndpointAction{Handler: containerMetadataTemplatesDelete, AccessHandler: allowProjectPermission("containers", "manage-containers")},
 }
 
 var instanceBackupsCmd = APIEndpoint{
@@ -153,8 +153,8 @@ var instanceBackupsCmd = APIEndpoint{
 		{Name: "vmBackups", Path: "virtual-machines/{name}/backups"},
 	},
 
-	Get:  APIEndpointAction{Handler: containerBackupsGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post: APIEndpointAction{Handler: containerBackupsPost, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:  APIEndpointAction{Handler: containerBackupsGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post: APIEndpointAction{Handler: containerBackupsPost, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceBackupCmd = APIEndpoint{
@@ -165,9 +165,9 @@ var instanceBackupCmd = APIEndpoint{
 		{Name: "vmBackup", Path: "virtual-machines/{name}/backups/{backupName}"},
 	},
 
-	Get:    APIEndpointAction{Handler: containerBackupGet, AccessHandler: AllowProjectPermission("containers", "view")},
-	Post:   APIEndpointAction{Handler: containerBackupPost, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
-	Delete: APIEndpointAction{Handler: containerBackupDelete, AccessHandler: AllowProjectPermission("containers", "operate-containers")},
+	Get:    APIEndpointAction{Handler: containerBackupGet, AccessHandler: allowProjectPermission("containers", "view")},
+	Post:   APIEndpointAction{Handler: containerBackupPost, AccessHandler: allowProjectPermission("containers", "operate-containers")},
+	Delete: APIEndpointAction{Handler: containerBackupDelete, AccessHandler: allowProjectPermission("containers", "operate-containers")},
 }
 
 var instanceBackupExportCmd = APIEndpoint{
@@ -178,7 +178,7 @@ var instanceBackupExportCmd = APIEndpoint{
 		{Name: "vmBackupExport", Path: "virtual-machines/{name}/backups/{backupName}/export"},
 	},
 
-	Get: APIEndpointAction{Handler: containerBackupExportGet, AccessHandler: AllowProjectPermission("containers", "view")},
+	Get: APIEndpointAction{Handler: containerBackupExportGet, AccessHandler: allowProjectPermission("containers", "view")},
 }
 
 type containerAutostartList []instance.Instance
diff --git a/lxd/networks.go b/lxd/networks.go
index 57a5e71d1c..43d60cda78 100644
--- a/lxd/networks.go
+++ b/lxd/networks.go
@@ -35,7 +35,7 @@ var networkCreateLock sync.Mutex
 var networksCmd = APIEndpoint{
 	Path: "networks",
 
-	Get:  APIEndpointAction{Handler: networksGet, AccessHandler: AllowAuthenticated},
+	Get:  APIEndpointAction{Handler: networksGet, AccessHandler: allowAuthenticated},
 	Post: APIEndpointAction{Handler: networksPost},
 }
 
@@ -43,7 +43,7 @@ var networkCmd = APIEndpoint{
 	Path: "networks/{name}",
 
 	Delete: APIEndpointAction{Handler: networkDelete},
-	Get:    APIEndpointAction{Handler: networkGet, AccessHandler: AllowAuthenticated},
+	Get:    APIEndpointAction{Handler: networkGet, AccessHandler: allowAuthenticated},
 	Patch:  APIEndpointAction{Handler: networkPatch},
 	Post:   APIEndpointAction{Handler: networkPost},
 	Put:    APIEndpointAction{Handler: networkPut},
@@ -52,13 +52,13 @@ var networkCmd = APIEndpoint{
 var networkLeasesCmd = APIEndpoint{
 	Path: "networks/{name}/leases",
 
-	Get: APIEndpointAction{Handler: networkLeasesGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: networkLeasesGet, AccessHandler: allowAuthenticated},
 }
 
 var networkStateCmd = APIEndpoint{
 	Path: "networks/{name}/state",
 
-	Get: APIEndpointAction{Handler: networkStateGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: networkStateGet, AccessHandler: allowAuthenticated},
 }
 
 // API endpoints
diff --git a/lxd/operations.go b/lxd/operations.go
index 423e466b2c..5d748ed89a 100644
--- a/lxd/operations.go
+++ b/lxd/operations.go
@@ -22,20 +22,20 @@ import (
 var operationCmd = APIEndpoint{
 	Path: "operations/{id}",
 
-	Delete: APIEndpointAction{Handler: operationDelete, AccessHandler: AllowAuthenticated},
-	Get:    APIEndpointAction{Handler: operationGet, AccessHandler: AllowAuthenticated},
+	Delete: APIEndpointAction{Handler: operationDelete, AccessHandler: allowAuthenticated},
+	Get:    APIEndpointAction{Handler: operationGet, AccessHandler: allowAuthenticated},
 }
 
 var operationsCmd = APIEndpoint{
 	Path: "operations",
 
-	Get: APIEndpointAction{Handler: operationsGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: operationsGet, AccessHandler: allowAuthenticated},
 }
 
 var operationWait = APIEndpoint{
 	Path: "operations/{id}/wait",
 
-	Get: APIEndpointAction{Handler: operationWaitGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: operationWaitGet, AccessHandler: allowAuthenticated},
 }
 
 var operationWebsocket = APIEndpoint{
diff --git a/lxd/profiles.go b/lxd/profiles.go
index 9647f8cb38..406f86cd35 100644
--- a/lxd/profiles.go
+++ b/lxd/profiles.go
@@ -28,18 +28,18 @@ import (
 var profilesCmd = APIEndpoint{
 	Path: "profiles",
 
-	Get:  APIEndpointAction{Handler: profilesGet, AccessHandler: AllowProjectPermission("profiles", "view")},
-	Post: APIEndpointAction{Handler: profilesPost, AccessHandler: AllowProjectPermission("profiles", "manage-profiles")},
+	Get:  APIEndpointAction{Handler: profilesGet, AccessHandler: allowProjectPermission("profiles", "view")},
+	Post: APIEndpointAction{Handler: profilesPost, AccessHandler: allowProjectPermission("profiles", "manage-profiles")},
 }
 
 var profileCmd = APIEndpoint{
 	Path: "profiles/{name}",
 
-	Delete: APIEndpointAction{Handler: profileDelete, AccessHandler: AllowProjectPermission("profiles", "manage-profiles")},
-	Get:    APIEndpointAction{Handler: profileGet, AccessHandler: AllowProjectPermission("profiles", "view")},
-	Patch:  APIEndpointAction{Handler: profilePatch, AccessHandler: AllowProjectPermission("profiles", "manage-profiles")},
-	Post:   APIEndpointAction{Handler: profilePost, AccessHandler: AllowProjectPermission("profiles", "manage-profiles")},
-	Put:    APIEndpointAction{Handler: profilePut, AccessHandler: AllowProjectPermission("profiles", "manage-profiles")},
+	Delete: APIEndpointAction{Handler: profileDelete, AccessHandler: allowProjectPermission("profiles", "manage-profiles")},
+	Get:    APIEndpointAction{Handler: profileGet, AccessHandler: allowProjectPermission("profiles", "view")},
+	Patch:  APIEndpointAction{Handler: profilePatch, AccessHandler: allowProjectPermission("profiles", "manage-profiles")},
+	Post:   APIEndpointAction{Handler: profilePost, AccessHandler: allowProjectPermission("profiles", "manage-profiles")},
+	Put:    APIEndpointAction{Handler: profilePut, AccessHandler: allowProjectPermission("profiles", "manage-profiles")},
 }
 
 /* This is used for both profiles post and profile put */
diff --git a/lxd/resources.go b/lxd/resources.go
index 78b257af9f..6bd12305d6 100644
--- a/lxd/resources.go
+++ b/lxd/resources.go
@@ -14,13 +14,13 @@ import (
 var api10ResourcesCmd = APIEndpoint{
 	Path: "resources",
 
-	Get: APIEndpointAction{Handler: api10ResourcesGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: api10ResourcesGet, AccessHandler: allowAuthenticated},
 }
 
 var storagePoolResourcesCmd = APIEndpoint{
 	Path: "storage-pools/{name}/resources",
 
-	Get: APIEndpointAction{Handler: storagePoolResourcesGet, AccessHandler: AllowAuthenticated},
+	Get: APIEndpointAction{Handler: storagePoolResourcesGet, AccessHandler: allowAuthenticated},
 }
 
 // /1.0/resources
diff --git a/lxd/storage_pools.go b/lxd/storage_pools.go
index 327e8ca2de..6c42e13fb7 100644
--- a/lxd/storage_pools.go
+++ b/lxd/storage_pools.go
@@ -26,7 +26,7 @@ var storagePoolCreateLock sync.Mutex
 var storagePoolsCmd = APIEndpoint{
 	Path: "storage-pools",
 
-	Get:  APIEndpointAction{Handler: storagePoolsGet, AccessHandler: AllowAuthenticated},
+	Get:  APIEndpointAction{Handler: storagePoolsGet, AccessHandler: allowAuthenticated},
 	Post: APIEndpointAction{Handler: storagePoolsPost},
 }
 
@@ -34,7 +34,7 @@ var storagePoolCmd = APIEndpoint{
 	Path: "storage-pools/{name}",
 
 	Delete: APIEndpointAction{Handler: storagePoolDelete},
-	Get:    APIEndpointAction{Handler: storagePoolGet, AccessHandler: AllowAuthenticated},
+	Get:    APIEndpointAction{Handler: storagePoolGet, AccessHandler: allowAuthenticated},
 	Patch:  APIEndpointAction{Handler: storagePoolPatch},
 	Put:    APIEndpointAction{Handler: storagePoolPut},
 }
diff --git a/lxd/storage_volumes.go b/lxd/storage_volumes.go
index ef724195d4..782729c5d8 100644
--- a/lxd/storage_volumes.go
+++ b/lxd/storage_volumes.go
@@ -29,55 +29,55 @@ import (
 var storagePoolVolumesCmd = APIEndpoint{
 	Path: "storage-pools/{name}/volumes",
 
-	Get:  APIEndpointAction{Handler: storagePoolVolumesGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Post: APIEndpointAction{Handler: storagePoolVolumesPost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:  APIEndpointAction{Handler: storagePoolVolumesGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Post: APIEndpointAction{Handler: storagePoolVolumesPost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumesTypeCmd = APIEndpoint{
 	Path: "storage-pools/{name}/volumes/{type}",
 
-	Get:  APIEndpointAction{Handler: storagePoolVolumesTypeGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Post: APIEndpointAction{Handler: storagePoolVolumesTypePost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:  APIEndpointAction{Handler: storagePoolVolumesTypeGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Post: APIEndpointAction{Handler: storagePoolVolumesTypePost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumeTypeContainerCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/container/{name:.*}",
 
-	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeContainerDelete, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeContainerGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeContainerPatch, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeContainerPost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeContainerPut, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeContainerDelete, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeContainerGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeContainerPatch, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeContainerPost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeContainerPut, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumeTypeVMCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/virtual-machine/{name:.*}",
 
-	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeVMDelete, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeVMGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeVMPatch, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeVMPost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeVMPut, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeVMDelete, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeVMGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeVMPatch, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeVMPost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeVMPut, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumeTypeCustomCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/custom/{name}",
 
-	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeCustomDelete, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeCustomGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeCustomPatch, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeCustomPost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeCustomPut, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeCustomDelete, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeCustomGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeCustomPatch, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeCustomPost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeCustomPut, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumeTypeImageCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/image/{name}",
 
-	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeImageDelete, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeImageGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeImagePatch, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeImagePost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeImagePut, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Delete: APIEndpointAction{Handler: storagePoolVolumeTypeImageDelete, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:    APIEndpointAction{Handler: storagePoolVolumeTypeImageGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Patch:  APIEndpointAction{Handler: storagePoolVolumeTypeImagePatch, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Post:   APIEndpointAction{Handler: storagePoolVolumeTypeImagePost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Put:    APIEndpointAction{Handler: storagePoolVolumeTypeImagePut, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 // /1.0/storage-pools/{name}/volumes
diff --git a/lxd/storage_volumes_snapshot.go b/lxd/storage_volumes_snapshot.go
index 75bfd9367c..9452ff93e2 100644
--- a/lxd/storage_volumes_snapshot.go
+++ b/lxd/storage_volumes_snapshot.go
@@ -22,17 +22,17 @@ import (
 var storagePoolVolumeSnapshotsTypeCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/{type}/{name}/snapshots",
 
-	Get:  APIEndpointAction{Handler: storagePoolVolumeSnapshotsTypeGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Post: APIEndpointAction{Handler: storagePoolVolumeSnapshotsTypePost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:  APIEndpointAction{Handler: storagePoolVolumeSnapshotsTypeGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Post: APIEndpointAction{Handler: storagePoolVolumeSnapshotsTypePost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 var storagePoolVolumeSnapshotTypeCmd = APIEndpoint{
 	Path: "storage-pools/{pool}/volumes/{type}/{name}/snapshots/{snapshotName}",
 
-	Delete: APIEndpointAction{Handler: storagePoolVolumeSnapshotTypeDelete, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Get:    APIEndpointAction{Handler: storagePoolVolumeSnapshotTypeGet, AccessHandler: AllowProjectPermission("storage-volumes", "view")},
-	Post:   APIEndpointAction{Handler: storagePoolVolumeSnapshotTypePost, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
-	Put:    APIEndpointAction{Handler: storagePoolVolumeSnapshotTypePut, AccessHandler: AllowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Delete: APIEndpointAction{Handler: storagePoolVolumeSnapshotTypeDelete, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Get:    APIEndpointAction{Handler: storagePoolVolumeSnapshotTypeGet, AccessHandler: allowProjectPermission("storage-volumes", "view")},
+	Post:   APIEndpointAction{Handler: storagePoolVolumeSnapshotTypePost, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
+	Put:    APIEndpointAction{Handler: storagePoolVolumeSnapshotTypePut, AccessHandler: allowProjectPermission("storage-volumes", "manage-storage-volumes")},
 }
 
 func storagePoolVolumeSnapshotsTypePost(d *Daemon, r *http.Request) response.Response {

From 172b68fdf8c110ed3219703a4ce9f5547a486418 Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:57:04 +0000
Subject: [PATCH 6/9] lxd: Unexports DevLxdServer

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/daemon.go | 2 +-
 lxd/devlxd.go | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/lxd/daemon.go b/lxd/daemon.go
index 7e284c7661..e68bc9d210 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -725,7 +725,7 @@ func (d *Daemon) init() error {
 		UnixSocket:           d.UnixSocket(),
 		Cert:                 certInfo,
 		RestServer:           restServer(d),
-		DevLxdServer:         DevLxdServer(d),
+		DevLxdServer:         devLxdServer(d),
 		LocalUnixSocketGroup: d.config.Group,
 		NetworkAddress:       address,
 		ClusterAddress:       clusterAddress,
diff --git a/lxd/devlxd.go b/lxd/devlxd.go
index c231cdd3b2..b7871737ee 100644
--- a/lxd/devlxd.go
+++ b/lxd/devlxd.go
@@ -30,7 +30,7 @@ import (
 
 // DevLxdServer creates an http.Server capable of handling requests against the
 // /dev/lxd Unix socket endpoint created inside containers.
-func DevLxdServer(d *Daemon) *http.Server {
+func devLxdServer(d *Daemon) *http.Server {
 	return &http.Server{
 		Handler:   devLxdAPI(d),
 		ConnState: pidMapper.ConnStateHandler,

From ccd4b8e683641fb4c50a94c24d6babccac6a1c7e Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:57:59 +0000
Subject: [PATCH 7/9] lxd: Unexports daemon feature functions

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/daemon.go            | 8 ++++----
 lxd/main_checkfeature.go | 8 ++++----
 2 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/lxd/daemon.go b/lxd/daemon.go
index e68bc9d210..ad56b4c891 100644
--- a/lxd/daemon.go
+++ b/lxd/daemon.go
@@ -590,28 +590,28 @@ func (d *Daemon) init() error {
 
 	// Look for kernel features
 	logger.Infof("Kernel features:")
-	d.os.NetnsGetifaddrs = CanUseNetnsGetifaddrs()
+	d.os.NetnsGetifaddrs = canUseNetnsGetifaddrs()
 	if d.os.NetnsGetifaddrs {
 		logger.Infof(" - netnsid-based network retrieval: yes")
 	} else {
 		logger.Infof(" - netnsid-based network retrieval: no")
 	}
 
-	d.os.UeventInjection = CanUseUeventInjection()
+	d.os.UeventInjection = canUseUeventInjection()
 	if d.os.UeventInjection {
 		logger.Infof(" - uevent injection: yes")
 	} else {
 		logger.Infof(" - uevent injection: no")
 	}
 
-	d.os.SeccompListener = CanUseSeccompListener()
+	d.os.SeccompListener = canUseSeccompListener()
 	if d.os.SeccompListener {
 		logger.Infof(" - seccomp listener: yes")
 	} else {
 		logger.Infof(" - seccomp listener: no")
 	}
 
-	d.os.SeccompListenerContinue = CanUseSeccompListenerContinue()
+	d.os.SeccompListenerContinue = canUseSeccompListenerContinue()
 	if d.os.SeccompListenerContinue {
 		logger.Infof(" - seccomp listener continue syscalls: yes")
 	} else {
diff --git a/lxd/main_checkfeature.go b/lxd/main_checkfeature.go
index ac167bdbbc..c3e5c7091b 100644
--- a/lxd/main_checkfeature.go
+++ b/lxd/main_checkfeature.go
@@ -311,7 +311,7 @@ static bool is_empty_string(char *s)
 */
 import "C"
 
-func CanUseNetnsGetifaddrs() bool {
+func canUseNetnsGetifaddrs() bool {
 	if !bool(C.is_empty_string(&C.errbuf[0])) {
 		logger.Debugf("%s", C.GoString(&C.errbuf[0]))
 	}
@@ -319,14 +319,14 @@ func CanUseNetnsGetifaddrs() bool {
 	return bool(C.netnsid_aware)
 }
 
-func CanUseUeventInjection() bool {
+func canUseUeventInjection() bool {
 	return bool(C.uevent_aware)
 }
 
-func CanUseSeccompListener() bool {
+func canUseSeccompListener() bool {
 	return bool(C.seccomp_notify_aware > 0)
 }
 
-func CanUseSeccompListenerContinue() bool {
+func canUseSeccompListenerContinue() bool {
 	return bool(C.seccomp_notify_aware == 2)
 }

From 424154d55fbde6832ca4b5a889a80b62d9539f86 Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 16:59:09 +0000
Subject: [PATCH 8/9] lxd: Unexports migration setup functions

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/instances_post.go          | 2 +-
 lxd/migrate_instance.go        | 2 +-
 lxd/migrate_storage_volumes.go | 4 ++--
 lxd/storage_volumes.go         | 4 ++--
 4 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/lxd/instances_post.go b/lxd/instances_post.go
index 95ce2e9b75..a4fcc8f036 100644
--- a/lxd/instances_post.go
+++ b/lxd/instances_post.go
@@ -313,7 +313,7 @@ func createFromMigration(d *Daemon, project string, req *api.InstancesPost) resp
 		Refresh:      req.Source.Refresh,
 	}
 
-	sink, err := NewMigrationSink(&migrationArgs)
+	sink, err := newMigrationSink(&migrationArgs)
 	if err != nil {
 		return response.InternalError(err)
 	}
diff --git a/lxd/migrate_instance.go b/lxd/migrate_instance.go
index 32313d2378..3c63cc2ae5 100644
--- a/lxd/migrate_instance.go
+++ b/lxd/migrate_instance.go
@@ -699,7 +699,7 @@ func (s *migrationSourceWs) Do(state *state.State, migrateOp *operations.Operati
 	return nil
 }
 
-func NewMigrationSink(args *MigrationSinkArgs) (*migrationSink, error) {
+func newMigrationSink(args *MigrationSinkArgs) (*migrationSink, error) {
 	sink := migrationSink{
 		src:     migrationFields{instance: args.Instance, instanceOnly: args.InstanceOnly},
 		dest:    migrationFields{instanceOnly: args.InstanceOnly},
diff --git a/lxd/migrate_storage_volumes.go b/lxd/migrate_storage_volumes.go
index d7e51710d2..d02e1a24ba 100644
--- a/lxd/migrate_storage_volumes.go
+++ b/lxd/migrate_storage_volumes.go
@@ -17,7 +17,7 @@ import (
 	"github.com/lxc/lxd/shared/logger"
 )
 
-func NewStorageMigrationSource(volumeOnly bool) (*migrationSourceWs, error) {
+func newStorageMigrationSource(volumeOnly bool) (*migrationSourceWs, error) {
 	ret := migrationSourceWs{migrationFields{}, make(chan bool, 1)}
 	ret.volumeOnly = volumeOnly
 
@@ -144,7 +144,7 @@ func (s *migrationSourceWs) DoStorage(state *state.State, projectName string, po
 	return nil
 }
 
-func NewStorageMigrationSink(args *MigrationSinkArgs) (*migrationSink, error) {
+func newStorageMigrationSink(args *MigrationSinkArgs) (*migrationSink, error) {
 	sink := migrationSink{
 		src:    migrationFields{volumeOnly: args.VolumeOnly},
 		dest:   migrationFields{volumeOnly: args.VolumeOnly},
diff --git a/lxd/storage_volumes.go b/lxd/storage_volumes.go
index 782729c5d8..a3a52e62ce 100644
--- a/lxd/storage_volumes.go
+++ b/lxd/storage_volumes.go
@@ -474,7 +474,7 @@ func doVolumeMigration(d *Daemon, projectName string, poolName string, req *api.
 		VolumeOnly: req.Source.VolumeOnly,
 	}
 
-	sink, err := NewStorageMigrationSink(&migrationArgs)
+	sink, err := newStorageMigrationSink(&migrationArgs)
 	if err != nil {
 		return response.InternalError(err)
 	}
@@ -634,7 +634,7 @@ func storagePoolVolumeTypePost(d *Daemon, r *http.Request, volumeTypeName string
 
 // storagePoolVolumeTypePostMigration handles volume migration type POST requests.
 func storagePoolVolumeTypePostMigration(state *state.State, projectName, poolName, volumeName string, req api.StorageVolumePost) response.Response {
-	ws, err := NewStorageMigrationSource(req.VolumeOnly)
+	ws, err := newStorageMigrationSource(req.VolumeOnly)
 	if err != nil {
 		return response.InternalError(err)
 	}

From 211ddcf99ef8b0ae4c0e65d0afd911aca7ab7910 Mon Sep 17 00:00:00 2001
From: Thomas Parrott <thomas.parrott at canonical.com>
Date: Mon, 16 Mar 2020 17:00:45 +0000
Subject: [PATCH 9/9] lxd: Unexports forwarded response helpers

Signed-off-by: Thomas Parrott <thomas.parrott at canonical.com>
---
 lxd/api_1.0.go                  |  6 +++---
 lxd/images.go                   |  2 +-
 lxd/instance_backup.go          | 12 ++++++------
 lxd/instance_console.go         |  2 +-
 lxd/instance_delete.go          |  2 +-
 lxd/instance_file.go            |  2 +-
 lxd/instance_get.go             |  2 +-
 lxd/instance_logs.go            |  6 +++---
 lxd/instance_metadata.go        | 10 +++++-----
 lxd/instance_patch.go           |  2 +-
 lxd/instance_post.go            |  2 +-
 lxd/instance_put.go             |  2 +-
 lxd/instance_snapshot.go        |  6 +++---
 lxd/instance_state.go           |  4 ++--
 lxd/networks.go                 |  4 ++--
 lxd/resources.go                |  4 ++--
 lxd/response.go                 | 12 ++++++------
 lxd/storage_pools.go            |  2 +-
 lxd/storage_volumes.go          | 24 ++++++++++++------------
 lxd/storage_volumes_snapshot.go | 20 ++++++++++----------
 20 files changed, 63 insertions(+), 63 deletions(-)

diff --git a/lxd/api_1.0.go b/lxd/api_1.0.go
index d54eff5c72..4d4bbbb6a6 100644
--- a/lxd/api_1.0.go
+++ b/lxd/api_1.0.go
@@ -120,7 +120,7 @@ func api10Get(d *Daemon, r *http.Request) response.Response {
 	}
 
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -251,7 +251,7 @@ func api10Get(d *Daemon, r *http.Request) response.Response {
 
 func api10Put(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -299,7 +299,7 @@ func api10Put(d *Daemon, r *http.Request) response.Response {
 
 func api10Patch(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
diff --git a/lxd/images.go b/lxd/images.go
index 4ed760c364..0941eac153 100644
--- a/lxd/images.go
+++ b/lxd/images.go
@@ -706,7 +706,7 @@ func imagesPost(d *Daemon, r *http.Request) response.Response {
 		if name != "" {
 			post.Seek(0, 0)
 			r.Body = post
-			resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+			resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 			if err != nil {
 				cleanup(builddir, post)
 				return response.SmartError(err)
diff --git a/lxd/instance_backup.go b/lxd/instance_backup.go
index db052da76b..4701d6cd4f 100644
--- a/lxd/instance_backup.go
+++ b/lxd/instance_backup.go
@@ -31,7 +31,7 @@ func containerBackupsGet(d *Daemon, r *http.Request) response.Response {
 	cname := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, cname, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, cname, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -82,7 +82,7 @@ func containerBackupsPost(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node.
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -203,7 +203,7 @@ func containerBackupGet(d *Daemon, r *http.Request) response.Response {
 	backupName := mux.Vars(r)["backupName"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -231,7 +231,7 @@ func containerBackupPost(d *Daemon, r *http.Request) response.Response {
 	backupName := mux.Vars(r)["backupName"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -290,7 +290,7 @@ func containerBackupDelete(d *Daemon, r *http.Request) response.Response {
 	backupName := mux.Vars(r)["backupName"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -336,7 +336,7 @@ func containerBackupExportGet(d *Daemon, r *http.Request) response.Response {
 	backupName := mux.Vars(r)["backupName"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, proj, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, proj, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_console.go b/lxd/instance_console.go
index 6c20df161a..2c51563bad 100644
--- a/lxd/instance_console.go
+++ b/lxd/instance_console.go
@@ -333,7 +333,7 @@ func containerConsoleLogGet(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Forward the request if the container is remote.
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_delete.go b/lxd/instance_delete.go
index 4b6c022998..d09cd72fad 100644
--- a/lxd/instance_delete.go
+++ b/lxd/instance_delete.go
@@ -20,7 +20,7 @@ func containerDelete(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_file.go b/lxd/instance_file.go
index 297fea5af2..c1f3c031ee 100644
--- a/lxd/instance_file.go
+++ b/lxd/instance_file.go
@@ -24,7 +24,7 @@ func containerFileHandler(d *Daemon, r *http.Request) response.Response {
 	project := projectParam(r)
 	name := mux.Vars(r)["name"]
 
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_get.go b/lxd/instance_get.go
index 800fcc771a..9dbe7ab21e 100644
--- a/lxd/instance_get.go
+++ b/lxd/instance_get.go
@@ -18,7 +18,7 @@ func containerGet(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_logs.go b/lxd/instance_logs.go
index 1fc437ab1d..484dc52ad9 100644
--- a/lxd/instance_logs.go
+++ b/lxd/instance_logs.go
@@ -57,7 +57,7 @@ func containerLogsGet(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -110,7 +110,7 @@ func containerLogGet(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, projectName, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, projectName, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -147,7 +147,7 @@ func containerLogDelete(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_metadata.go b/lxd/instance_metadata.go
index 5fe5bc428f..6cdd557163 100644
--- a/lxd/instance_metadata.go
+++ b/lxd/instance_metadata.go
@@ -29,7 +29,7 @@ func containerMetadataGet(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -90,7 +90,7 @@ func containerMetadataPut(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -144,7 +144,7 @@ func containerMetadataTemplatesGet(d *Daemon, r *http.Request) response.Response
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -238,7 +238,7 @@ func containerMetadataTemplatesPostPut(d *Daemon, r *http.Request) response.Resp
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -311,7 +311,7 @@ func containerMetadataTemplatesDelete(d *Daemon, r *http.Request) response.Respo
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_patch.go b/lxd/instance_patch.go
index eb95714cd7..5d2bcc2234 100644
--- a/lxd/instance_patch.go
+++ b/lxd/instance_patch.go
@@ -32,7 +32,7 @@ func containerPatch(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_post.go b/lxd/instance_post.go
index 66e6940549..b48974c624 100644
--- a/lxd/instance_post.go
+++ b/lxd/instance_post.go
@@ -130,7 +130,7 @@ func containerPost(d *Daemon, r *http.Request) response.Response {
 	// and we'll either forward the request or load the container.
 	if targetNode == "" || !sourceNodeOffline {
 		// Handle requests targeted to a container on a different node.
-		resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+		resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 		if err != nil {
 			return response.SmartError(err)
 		}
diff --git a/lxd/instance_put.go b/lxd/instance_put.go
index ca3b6523f8..49f430783c 100644
--- a/lxd/instance_put.go
+++ b/lxd/instance_put.go
@@ -36,7 +36,7 @@ func containerPut(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_snapshot.go b/lxd/instance_snapshot.go
index 53b17b0868..d9545732e1 100644
--- a/lxd/instance_snapshot.go
+++ b/lxd/instance_snapshot.go
@@ -34,7 +34,7 @@ func containerSnapshotsGet(d *Daemon, r *http.Request) response.Response {
 	cname := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, projectName, cname, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, projectName, cname, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -100,7 +100,7 @@ func containerSnapshotsPost(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -195,7 +195,7 @@ func containerSnapshotHandler(d *Daemon, r *http.Request) response.Response {
 	containerName := mux.Vars(r)["name"]
 	snapshotName := mux.Vars(r)["snapshotName"]
 
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, containerName, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, containerName, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/instance_state.go b/lxd/instance_state.go
index 180d2d8dd8..88f3dcc0cc 100644
--- a/lxd/instance_state.go
+++ b/lxd/instance_state.go
@@ -27,7 +27,7 @@ func containerState(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
@@ -57,7 +57,7 @@ func containerStatePut(d *Daemon, r *http.Request) response.Response {
 	name := mux.Vars(r)["name"]
 
 	// Handle requests targeted to a container on a different node
-	resp, err := ForwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
+	resp, err := forwardedResponseIfContainerIsRemote(d, r, project, name, instanceType)
 	if err != nil {
 		return response.SmartError(err)
 	}
diff --git a/lxd/networks.go b/lxd/networks.go
index 43d60cda78..f87fd0b2e7 100644
--- a/lxd/networks.go
+++ b/lxd/networks.go
@@ -327,7 +327,7 @@ func doNetworksCreate(d *Daemon, req api.NetworksPost, withDatabase bool) error
 
 func networkGet(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -883,7 +883,7 @@ func networkShutdown(s *state.State) error {
 
 func networkStateGet(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
diff --git a/lxd/resources.go b/lxd/resources.go
index 6bd12305d6..620deecdfa 100644
--- a/lxd/resources.go
+++ b/lxd/resources.go
@@ -27,7 +27,7 @@ var storagePoolResourcesCmd = APIEndpoint{
 // Get system resources
 func api10ResourcesGet(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -45,7 +45,7 @@ func api10ResourcesGet(d *Daemon, r *http.Request) response.Response {
 // Get resources for a specific storage pool
 func storagePoolResourcesGet(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
diff --git a/lxd/response.go b/lxd/response.go
index 1cd459dbcb..c071d78204 100644
--- a/lxd/response.go
+++ b/lxd/response.go
@@ -9,9 +9,9 @@ import (
 	"github.com/lxc/lxd/lxd/response"
 )
 
-// ForwardedResponseIfTargetIsRemote redirects a request to the request has a
+// forwardedResponseIfTargetIsRemote redirects a request to the request has a
 // targetNode parameter pointing to a node which is not the local one.
-func ForwardedResponseIfTargetIsRemote(d *Daemon, request *http.Request) response.Response {
+func forwardedResponseIfTargetIsRemote(d *Daemon, request *http.Request) response.Response {
 	targetNode := queryParam(request, "target")
 	if targetNode == "" {
 		return nil
@@ -37,10 +37,10 @@ func ForwardedResponseIfTargetIsRemote(d *Daemon, request *http.Request) respons
 	return nil
 }
 
-// ForwardedResponseIfContainerIsRemote redirects a request to the node running
+// forwardedResponseIfContainerIsRemote redirects a request to the node running
 // the container with the given name. If the container is local, nothing gets
 // done and nil is returned.
-func ForwardedResponseIfContainerIsRemote(d *Daemon, r *http.Request, project, name string, instanceType instancetype.Type) (response.Response, error) {
+func forwardedResponseIfContainerIsRemote(d *Daemon, r *http.Request, project, name string, instanceType instancetype.Type) (response.Response, error) {
 	cert := d.endpoints.NetworkCert()
 	client, err := cluster.ConnectIfContainerIsRemote(d.cluster, project, name, cert, instanceType)
 	if err != nil {
@@ -52,14 +52,14 @@ func ForwardedResponseIfContainerIsRemote(d *Daemon, r *http.Request, project, n
 	return response.ForwardedResponse(client, r), nil
 }
 
-// ForwardedResponseIfVolumeIsRemote redirects a request to the node hosting
+// forwardedResponseIfVolumeIsRemote redirects a request to the node hosting
 // the volume with the given pool ID, name and type. If the container is local,
 // nothing gets done and nil is returned. If more than one node has a matching
 // volume, an error is returned.
 //
 // This is used when no targetNode is specified, and saves users some typing
 // when the volume name/type is unique to a node.
-func ForwardedResponseIfVolumeIsRemote(d *Daemon, r *http.Request, poolID int64, volumeName string, volumeType int) response.Response {
+func forwardedResponseIfVolumeIsRemote(d *Daemon, r *http.Request, poolID int64, volumeName string, volumeType int) response.Response {
 	if queryParam(r, "target") != "" {
 		return nil
 	}
diff --git a/lxd/storage_pools.go b/lxd/storage_pools.go
index 6c42e13fb7..ae672da73f 100644
--- a/lxd/storage_pools.go
+++ b/lxd/storage_pools.go
@@ -287,7 +287,7 @@ func storagePoolsPostCluster(d *Daemon, req api.StoragePoolsPost) error {
 // Get a single storage pool.
 func storagePoolGet(d *Daemon, r *http.Request) response.Response {
 	// If a target was specified, forward the request to the relevant node.
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
diff --git a/lxd/storage_volumes.go b/lxd/storage_volumes.go
index a3a52e62ce..ffed539d37 100644
--- a/lxd/storage_volumes.go
+++ b/lxd/storage_volumes.go
@@ -262,7 +262,7 @@ func storagePoolVolumesTypeGet(d *Daemon, r *http.Request) response.Response {
 // /1.0/storage-pools/{name}/volumes/{type}
 // Create a storage volume in a given storage pool.
 func storagePoolVolumesTypePost(d *Daemon, r *http.Request) response.Response {
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -363,7 +363,7 @@ func doVolumeCreateOrCopy(d *Daemon, projectName, poolName string, req *api.Stor
 // /1.0/storage-pools/{name}/volumes/{type}
 // Create a storage volume of a given volume type in a given storage pool.
 func storagePoolVolumesPost(d *Daemon, r *http.Request) response.Response {
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -572,7 +572,7 @@ func storagePoolVolumeTypePost(d *Daemon, r *http.Request, volumeTypeName string
 	}
 	r.Body = shared.BytesReadCloser{Buf: &buf}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -583,7 +583,7 @@ func storagePoolVolumeTypePost(d *Daemon, r *http.Request, volumeTypeName string
 		return response.BadRequest(err)
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -801,12 +801,12 @@ func storagePoolVolumeTypeGet(d *Daemon, r *http.Request, volumeTypeName string)
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -880,12 +880,12 @@ func storagePoolVolumeTypePut(d *Daemon, r *http.Request, volumeTypeName string)
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, pool.ID(), volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, pool.ID(), volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -1010,12 +1010,12 @@ func storagePoolVolumeTypePatch(d *Daemon, r *http.Request, volumeTypeName strin
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, pool.ID(), volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, pool.ID(), volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -1103,7 +1103,7 @@ func storagePoolVolumeTypeDelete(d *Daemon, r *http.Request, volumeTypeName stri
 		return response.BadRequest(fmt.Errorf("Invalid storage volume type %q", volumeTypeName))
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -1113,7 +1113,7 @@ func storagePoolVolumeTypeDelete(d *Daemon, r *http.Request, volumeTypeName stri
 		return response.SmartError(err)
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
diff --git a/lxd/storage_volumes_snapshot.go b/lxd/storage_volumes_snapshot.go
index 9452ff93e2..0fcf2ce444 100644
--- a/lxd/storage_volumes_snapshot.go
+++ b/lxd/storage_volumes_snapshot.go
@@ -96,12 +96,12 @@ func storagePoolVolumeSnapshotsTypePost(d *Daemon, r *http.Request) response.Res
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
 
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, volumeName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -261,7 +261,7 @@ func storagePoolVolumeSnapshotTypePost(d *Daemon, r *http.Request) response.Resp
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -272,7 +272,7 @@ func storagePoolVolumeSnapshotTypePost(d *Daemon, r *http.Request) response.Resp
 	}
 
 	fullSnapshotName := fmt.Sprintf("%s/%s", volumeName, snapshotName)
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -327,7 +327,7 @@ func storagePoolVolumeSnapshotTypeGet(d *Daemon, r *http.Request) response.Respo
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -338,7 +338,7 @@ func storagePoolVolumeSnapshotTypeGet(d *Daemon, r *http.Request) response.Respo
 	}
 
 	fullSnapshotName := fmt.Sprintf("%s/%s", volumeName, snapshotName)
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -389,7 +389,7 @@ func storagePoolVolumeSnapshotTypePut(d *Daemon, r *http.Request) response.Respo
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -400,7 +400,7 @@ func storagePoolVolumeSnapshotTypePut(d *Daemon, r *http.Request) response.Respo
 	}
 
 	fullSnapshotName := fmt.Sprintf("%s/%s", volumeName, snapshotName)
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
 	if resp != nil {
 		return resp
 	}
@@ -473,7 +473,7 @@ func storagePoolVolumeSnapshotTypeDelete(d *Daemon, r *http.Request) response.Re
 		return response.SmartError(err)
 	}
 
-	resp := ForwardedResponseIfTargetIsRemote(d, r)
+	resp := forwardedResponseIfTargetIsRemote(d, r)
 	if resp != nil {
 		return resp
 	}
@@ -484,7 +484,7 @@ func storagePoolVolumeSnapshotTypeDelete(d *Daemon, r *http.Request) response.Re
 	}
 
 	fullSnapshotName := fmt.Sprintf("%s/%s", volumeName, snapshotName)
-	resp = ForwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
+	resp = forwardedResponseIfVolumeIsRemote(d, r, poolID, fullSnapshotName, volumeType)
 	if resp != nil {
 		return resp
 	}


More information about the lxc-devel mailing list