prepare release of version 2.0, regen all APIs

This commit is contained in:
Sebastian Thiel
2021-04-01 23:46:26 +08:00
parent f1c05f2554
commit c606d37dd3
3415 changed files with 3620084 additions and 2930380 deletions

View File

@@ -3,50 +3,46 @@
// DO NOT EDIT !
#![allow(unused_variables, unused_imports, dead_code, unused_mut)]
extern crate tokio;
#[macro_use]
extern crate clap;
extern crate yup_oauth2 as oauth2;
extern crate yup_hyper_mock as mock;
extern crate hyper_rustls;
extern crate serde;
extern crate serde_json;
extern crate hyper;
extern crate mime;
extern crate strsim;
extern crate google_binaryauthorization1 as api;
use std::env;
use std::io::{self, Write};
use clap::{App, SubCommand, Arg};
mod cmn;
use google_binaryauthorization1::{api, Error};
use cmn::{InvalidOptionsError, CLIError, JsonTokenStorage, arg_from_str, writer_from_opts, parse_kv_arg,
mod client;
use client::{InvalidOptionsError, CLIError, arg_from_str, writer_from_opts, parse_kv_arg,
input_file_from_opts, input_mime_from_opts, FieldCursor, FieldError, CallType, UploadProtocol,
calltype_from_str, remove_json_null_values, ComplexType, JsonType, JsonTypeInfo};
use std::default::Default;
use std::str::FromStr;
use oauth2::{Authenticator, DefaultAuthenticatorDelegate, FlowType};
use serde_json as json;
use clap::ArgMatches;
enum DoitError {
IoError(String, io::Error),
ApiError(api::Error),
ApiError(Error),
}
struct Engine<'n> {
opt: ArgMatches<'n>,
hub: api::BinaryAuthorization<hyper::Client, Authenticator<DefaultAuthenticatorDelegate, JsonTokenStorage, hyper::Client>>,
hub: api::BinaryAuthorization<hyper::Client<hyper_rustls::HttpsConnector<hyper::client::connect::HttpConnector>, hyper::body::Body>
>,
gp: Vec<&'static str>,
gpm: Vec<(&'static str, &'static str)>,
}
impl<'n> Engine<'n> {
fn _projects_attestors_create(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_create(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -69,11 +65,11 @@ impl<'n> Engine<'n> {
let type_info: Option<(&'static str, JsonTypeInfo)> =
match &temp_cursor.to_string()[..] {
"description" => Some(("description", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"update-time" => Some(("updateTime", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"user-owned-grafeas-note.delegation-service-account-email" => Some(("userOwnedGrafeasNote.delegationServiceAccountEmail", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"user-owned-grafeas-note.note-reference" => Some(("userOwnedGrafeasNote.noteReference", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"description" => Some(("description", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
_ => {
let suggestion = FieldCursor::did_you_mean(key, &vec!["delegation-service-account-email", "description", "name", "note-reference", "update-time", "user-owned-grafeas-note"]);
err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string(), suggestion, value.map(|v| v.to_string()))));
@@ -124,7 +120,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -139,7 +135,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_delete(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_delete(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().attestors_delete(opt.value_of("name").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -176,7 +172,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -191,7 +187,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_get(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_get(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().attestors_get(opt.value_of("name").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -228,7 +224,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -243,7 +239,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_get_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_get_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().attestors_get_iam_policy(opt.value_of("resource").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -284,7 +280,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -299,7 +295,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_list(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_list(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().attestors_list(opt.value_of("parent").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -343,7 +339,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -358,7 +354,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_set_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_set_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -429,7 +425,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -444,7 +440,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_test_iam_permissions(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_test_iam_permissions(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -514,7 +510,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -529,7 +525,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_attestors_update(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_update(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -552,11 +548,11 @@ impl<'n> Engine<'n> {
let type_info: Option<(&'static str, JsonTypeInfo)> =
match &temp_cursor.to_string()[..] {
"description" => Some(("description", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"update-time" => Some(("updateTime", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"user-owned-grafeas-note.delegation-service-account-email" => Some(("userOwnedGrafeasNote.delegationServiceAccountEmail", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"user-owned-grafeas-note.note-reference" => Some(("userOwnedGrafeasNote.noteReference", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"description" => Some(("description", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
_ => {
let suggestion = FieldCursor::did_you_mean(key, &vec!["delegation-service-account-email", "description", "name", "note-reference", "update-time", "user-owned-grafeas-note"]);
err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string(), suggestion, value.map(|v| v.to_string()))));
@@ -603,7 +599,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -618,7 +614,94 @@ impl<'n> Engine<'n> {
}
}
fn _projects_get_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_attestors_validate_attestation_occurrence(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
let mut object = json::value::Value::Object(Default::default());
for kvarg in opt.values_of("kv").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
let last_errc = err.issues.len();
let (key, value) = parse_kv_arg(&*kvarg, err, false);
let mut temp_cursor = field_cursor.clone();
if let Err(field_err) = temp_cursor.set(&*key) {
err.issues.push(field_err);
}
if value.is_none() {
field_cursor = temp_cursor.clone();
if err.issues.len() > last_errc {
err.issues.remove(last_errc);
}
continue;
}
let type_info: Option<(&'static str, JsonTypeInfo)> =
match &temp_cursor.to_string()[..] {
"attestation.serialized-payload" => Some(("attestation.serializedPayload", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"occurrence-note" => Some(("occurrenceNote", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"occurrence-resource-uri" => Some(("occurrenceResourceUri", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
_ => {
let suggestion = FieldCursor::did_you_mean(key, &vec!["attestation", "occurrence-note", "occurrence-resource-uri", "serialized-payload"]);
err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string(), suggestion, value.map(|v| v.to_string()))));
None
}
};
if let Some((field_cursor_str, type_info)) = type_info {
FieldCursor::from(field_cursor_str).set_json_value(&mut object, value.unwrap(), type_info, err, &temp_cursor);
}
}
let mut request: api::ValidateAttestationOccurrenceRequest = json::value::from_value(object).unwrap();
let mut call = self.hub.projects().attestors_validate_attestation_occurrence(request, opt.value_of("attestor").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
let (key, value) = parse_kv_arg(&*parg, err, false);
match key {
_ => {
let mut found = false;
for param in &self.gp {
if key == *param {
found = true;
call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset"));
break;
}
}
if !found {
err.issues.push(CLIError::UnknownParameter(key.to_string(),
{let mut v = Vec::new();
v.extend(self.gp.iter().map(|v|*v));
v } ));
}
}
}
}
let protocol = CallType::Standard;
if dry_run {
Ok(())
} else {
assert!(err.issues.len() == 0);
for scope in self.opt.values_of("url").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
call = call.add_scope(scope);
}
let mut ostream = match writer_from_opts(opt.value_of("out")) {
Ok(mut f) => f,
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
Ok((mut response, output_schema)) => {
let mut value = json::value::to_value(&output_schema).expect("serde to work");
remove_json_null_values(&mut value);
json::to_writer_pretty(&mut ostream, &value).unwrap();
ostream.flush().unwrap();
Ok(())
}
}
}
}
async fn _projects_get_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().get_policy(opt.value_of("name").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -655,7 +738,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -670,7 +753,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_policy_get_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_policy_get_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.projects().policy_get_iam_policy(opt.value_of("resource").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
@@ -711,7 +794,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -726,7 +809,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_policy_set_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_policy_set_iam_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -797,7 +880,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -812,7 +895,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_policy_test_iam_permissions(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_policy_test_iam_permissions(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -882,7 +965,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -897,7 +980,7 @@ impl<'n> Engine<'n> {
}
}
fn _projects_update_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
async fn _projects_update_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut field_cursor = FieldCursor::default();
@@ -920,13 +1003,13 @@ impl<'n> Engine<'n> {
let type_info: Option<(&'static str, JsonTypeInfo)> =
match &temp_cursor.to_string()[..] {
"update-time" => Some(("updateTime", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"default-admission-rule.enforcement-mode" => Some(("defaultAdmissionRule.enforcementMode", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"default-admission-rule.require-attestations-by" => Some(("defaultAdmissionRule.requireAttestationsBy", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Vec })),
"default-admission-rule.evaluation-mode" => Some(("defaultAdmissionRule.evaluationMode", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"global-policy-evaluation-mode" => Some(("globalPolicyEvaluationMode", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"default-admission-rule.require-attestations-by" => Some(("defaultAdmissionRule.requireAttestationsBy", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Vec })),
"description" => Some(("description", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"global-policy-evaluation-mode" => Some(("globalPolicyEvaluationMode", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"name" => Some(("name", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
"update-time" => Some(("updateTime", JsonTypeInfo { jtype: JsonType::String, ctype: ComplexType::Pod })),
_ => {
let suggestion = FieldCursor::did_you_mean(key, &vec!["default-admission-rule", "description", "enforcement-mode", "evaluation-mode", "global-policy-evaluation-mode", "name", "require-attestations-by", "update-time"]);
err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string(), suggestion, value.map(|v| v.to_string()))));
@@ -973,7 +1056,7 @@ impl<'n> Engine<'n> {
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit(),
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
@@ -988,7 +1071,59 @@ impl<'n> Engine<'n> {
}
}
fn _doit(&self, dry_run: bool) -> Result<Result<(), DoitError>, Option<InvalidOptionsError>> {
async fn _systempolicy_get_policy(&self, opt: &ArgMatches<'n>, dry_run: bool, err: &mut InvalidOptionsError)
-> Result<(), DoitError> {
let mut call = self.hub.systempolicy().get_policy(opt.value_of("name").unwrap_or(""));
for parg in opt.values_of("v").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
let (key, value) = parse_kv_arg(&*parg, err, false);
match key {
_ => {
let mut found = false;
for param in &self.gp {
if key == *param {
found = true;
call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset"));
break;
}
}
if !found {
err.issues.push(CLIError::UnknownParameter(key.to_string(),
{let mut v = Vec::new();
v.extend(self.gp.iter().map(|v|*v));
v } ));
}
}
}
}
let protocol = CallType::Standard;
if dry_run {
Ok(())
} else {
assert!(err.issues.len() == 0);
for scope in self.opt.values_of("url").map(|i|i.collect()).unwrap_or(Vec::new()).iter() {
call = call.add_scope(scope);
}
let mut ostream = match writer_from_opts(opt.value_of("out")) {
Ok(mut f) => f,
Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)),
};
match match protocol {
CallType::Standard => call.doit().await,
_ => unreachable!()
} {
Err(api_err) => Err(DoitError::ApiError(api_err)),
Ok((mut response, output_schema)) => {
let mut value = json::value::to_value(&output_schema).expect("serde to work");
remove_json_null_values(&mut value);
json::to_writer_pretty(&mut ostream, &value).unwrap();
ostream.flush().unwrap();
Ok(())
}
}
}
}
async fn _doit(&self, dry_run: bool) -> Result<Result<(), DoitError>, Option<InvalidOptionsError>> {
let mut err = InvalidOptionsError::new();
let mut call_result: Result<(), DoitError> = Ok(());
let mut err_opt: Option<InvalidOptionsError> = None;
@@ -996,43 +1131,46 @@ impl<'n> Engine<'n> {
("projects", Some(opt)) => {
match opt.subcommand() {
("attestors-create", Some(opt)) => {
call_result = self._projects_attestors_create(opt, dry_run, &mut err);
call_result = self._projects_attestors_create(opt, dry_run, &mut err).await;
},
("attestors-delete", Some(opt)) => {
call_result = self._projects_attestors_delete(opt, dry_run, &mut err);
call_result = self._projects_attestors_delete(opt, dry_run, &mut err).await;
},
("attestors-get", Some(opt)) => {
call_result = self._projects_attestors_get(opt, dry_run, &mut err);
call_result = self._projects_attestors_get(opt, dry_run, &mut err).await;
},
("attestors-get-iam-policy", Some(opt)) => {
call_result = self._projects_attestors_get_iam_policy(opt, dry_run, &mut err);
call_result = self._projects_attestors_get_iam_policy(opt, dry_run, &mut err).await;
},
("attestors-list", Some(opt)) => {
call_result = self._projects_attestors_list(opt, dry_run, &mut err);
call_result = self._projects_attestors_list(opt, dry_run, &mut err).await;
},
("attestors-set-iam-policy", Some(opt)) => {
call_result = self._projects_attestors_set_iam_policy(opt, dry_run, &mut err);
call_result = self._projects_attestors_set_iam_policy(opt, dry_run, &mut err).await;
},
("attestors-test-iam-permissions", Some(opt)) => {
call_result = self._projects_attestors_test_iam_permissions(opt, dry_run, &mut err);
call_result = self._projects_attestors_test_iam_permissions(opt, dry_run, &mut err).await;
},
("attestors-update", Some(opt)) => {
call_result = self._projects_attestors_update(opt, dry_run, &mut err);
call_result = self._projects_attestors_update(opt, dry_run, &mut err).await;
},
("attestors-validate-attestation-occurrence", Some(opt)) => {
call_result = self._projects_attestors_validate_attestation_occurrence(opt, dry_run, &mut err).await;
},
("get-policy", Some(opt)) => {
call_result = self._projects_get_policy(opt, dry_run, &mut err);
call_result = self._projects_get_policy(opt, dry_run, &mut err).await;
},
("policy-get-iam-policy", Some(opt)) => {
call_result = self._projects_policy_get_iam_policy(opt, dry_run, &mut err);
call_result = self._projects_policy_get_iam_policy(opt, dry_run, &mut err).await;
},
("policy-set-iam-policy", Some(opt)) => {
call_result = self._projects_policy_set_iam_policy(opt, dry_run, &mut err);
call_result = self._projects_policy_set_iam_policy(opt, dry_run, &mut err).await;
},
("policy-test-iam-permissions", Some(opt)) => {
call_result = self._projects_policy_test_iam_permissions(opt, dry_run, &mut err);
call_result = self._projects_policy_test_iam_permissions(opt, dry_run, &mut err).await;
},
("update-policy", Some(opt)) => {
call_result = self._projects_update_policy(opt, dry_run, &mut err);
call_result = self._projects_update_policy(opt, dry_run, &mut err).await;
},
_ => {
err.issues.push(CLIError::MissingMethodError("projects".to_string()));
@@ -1040,6 +1178,17 @@ impl<'n> Engine<'n> {
}
}
},
("systempolicy", Some(opt)) => {
match opt.subcommand() {
("get-policy", Some(opt)) => {
call_result = self._systempolicy_get_policy(opt, dry_run, &mut err).await;
},
_ => {
err.issues.push(CLIError::MissingMethodError("systempolicy".to_string()));
writeln!(io::stderr(), "{}\n", opt.usage()).ok();
}
}
},
_ => {
err.issues.push(CLIError::MissingCommandError);
writeln!(io::stderr(), "{}\n", self.opt.usage()).ok();
@@ -1057,41 +1206,26 @@ impl<'n> Engine<'n> {
}
// Please note that this call will fail if any part of the opt can't be handled
fn new(opt: ArgMatches<'n>) -> Result<Engine<'n>, InvalidOptionsError> {
async fn new(opt: ArgMatches<'n>) -> Result<Engine<'n>, InvalidOptionsError> {
let (config_dir, secret) = {
let config_dir = match cmn::assure_config_dir_exists(opt.value_of("folder").unwrap_or("~/.google-service-cli")) {
let config_dir = match client::assure_config_dir_exists(opt.value_of("folder").unwrap_or("~/.google-service-cli")) {
Err(e) => return Err(InvalidOptionsError::single(e, 3)),
Ok(p) => p,
};
match cmn::application_secret_from_directory(&config_dir, "binaryauthorization1-secret.json",
match client::application_secret_from_directory(&config_dir, "binaryauthorization1-secret.json",
"{\"installed\":{\"auth_uri\":\"https://accounts.google.com/o/oauth2/auth\",\"client_secret\":\"hCsslbCUyfehWMmbkG8vTYxG\",\"token_uri\":\"https://accounts.google.com/o/oauth2/token\",\"client_email\":\"\",\"redirect_uris\":[\"urn:ietf:wg:oauth:2.0:oob\",\"oob\"],\"client_x509_cert_url\":\"\",\"client_id\":\"620010449518-9ngf7o4dhs0dka470npqvor6dc5lqb9b.apps.googleusercontent.com\",\"auth_provider_x509_cert_url\":\"https://www.googleapis.com/oauth2/v1/certs\"}}") {
Ok(secret) => (config_dir, secret),
Err(e) => return Err(InvalidOptionsError::single(e, 4))
}
};
let auth = Authenticator::new( &secret, DefaultAuthenticatorDelegate,
if opt.is_present("debug-auth") {
hyper::Client::with_connector(mock::TeeConnector {
connector: hyper::net::HttpsConnector::new(hyper_rustls::TlsClient::new())
})
} else {
hyper::Client::with_connector(hyper::net::HttpsConnector::new(hyper_rustls::TlsClient::new()))
},
JsonTokenStorage {
program_name: "binaryauthorization1",
db_dir: config_dir.clone(),
}, Some(FlowType::InstalledRedirect(54324)));
let auth = yup_oauth2::InstalledFlowAuthenticator::builder(
secret,
yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
).persist_tokens_to_disk(format!("{}/binaryauthorization1", config_dir)).build().await.unwrap();
let client =
if opt.is_present("debug") {
hyper::Client::with_connector(mock::TeeConnector {
connector: hyper::net::HttpsConnector::new(hyper_rustls::TlsClient::new())
})
} else {
hyper::Client::with_connector(hyper::net::HttpsConnector::new(hyper_rustls::TlsClient::new()))
};
let client = hyper::Client::builder().build(hyper_rustls::HttpsConnector::with_native_roots());
let engine = Engine {
opt: opt,
hub: api::BinaryAuthorization::new(client, auth),
@@ -1107,30 +1241,28 @@ impl<'n> Engine<'n> {
]
};
match engine._doit(true) {
match engine._doit(true).await {
Err(Some(err)) => Err(err),
Err(None) => Ok(engine),
Ok(_) => unreachable!(),
}
}
fn doit(&self) -> Result<(), DoitError> {
match self._doit(false) {
async fn doit(&self) -> Result<(), DoitError> {
match self._doit(false).await {
Ok(res) => res,
Err(_) => unreachable!(),
}
}
}
fn main() {
#[tokio::main]
async fn main() {
let mut exit_status = 0i32;
let arg_data = [
("projects", "methods: 'attestors-create', 'attestors-delete', 'attestors-get', 'attestors-get-iam-policy', 'attestors-list', 'attestors-set-iam-policy', 'attestors-test-iam-permissions', 'attestors-update', 'get-policy', 'policy-get-iam-policy', 'policy-set-iam-policy', 'policy-test-iam-permissions' and 'update-policy'", vec![
("projects", "methods: 'attestors-create', 'attestors-delete', 'attestors-get', 'attestors-get-iam-policy', 'attestors-list', 'attestors-set-iam-policy', 'attestors-test-iam-permissions', 'attestors-update', 'attestors-validate-attestation-occurrence', 'get-policy', 'policy-get-iam-policy', 'policy-set-iam-policy', 'policy-test-iam-permissions' and 'update-policy'", vec![
("attestors-create",
Some(r##"Creates an attestor, and returns a copy of the new
attestor. Returns NOT_FOUND if the project does not exist,
INVALID_ARGUMENT if the request is malformed, ALREADY_EXISTS if the
attestor already exists."##),
Some(r##"Creates an attestor, and returns a copy of the new attestor. Returns NOT_FOUND if the project does not exist, INVALID_ARGUMENT if the request is malformed, ALREADY_EXISTS if the attestor already exists."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-create",
vec![
(Some(r##"parent"##),
@@ -1158,14 +1290,12 @@ fn main() {
Some(false)),
]),
("attestors-delete",
Some(r##"Deletes an attestor. Returns NOT_FOUND if the
attestor does not exist."##),
Some(r##"Deletes an attestor. Returns NOT_FOUND if the attestor does not exist."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-delete",
vec![
(Some(r##"name"##),
None,
Some(r##"Required. The name of the attestors to delete, in the format
`projects/*/attestors/*`."##),
Some(r##"Required. The name of the attestors to delete, in the format `projects/*/attestors/*`."##),
Some(true),
Some(false)),
@@ -1182,14 +1312,12 @@ fn main() {
Some(false)),
]),
("attestors-get",
Some(r##"Gets an attestor.
Returns NOT_FOUND if the attestor does not exist."##),
Some(r##"Gets an attestor. Returns NOT_FOUND if the attestor does not exist."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-get",
vec![
(Some(r##"name"##),
None,
Some(r##"Required. The name of the attestor to retrieve, in the format
`projects/*/attestors/*`."##),
Some(r##"Required. The name of the attestor to retrieve, in the format `projects/*/attestors/*`."##),
Some(true),
Some(false)),
@@ -1206,15 +1334,12 @@ fn main() {
Some(false)),
]),
("attestors-get-iam-policy",
Some(r##"Gets the access control policy for a resource.
Returns an empty policy if the resource exists and does not have a policy
set."##),
Some(r##"Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-get-iam-policy",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy is being requested.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy is being requested. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1231,14 +1356,12 @@ fn main() {
Some(false)),
]),
("attestors-list",
Some(r##"Lists attestors.
Returns INVALID_ARGUMENT if the project does not exist."##),
Some(r##"Lists attestors. Returns INVALID_ARGUMENT if the project does not exist."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-list",
vec![
(Some(r##"parent"##),
None,
Some(r##"Required. The resource name of the project associated with the
attestors, in the format `projects/*`."##),
Some(r##"Required. The resource name of the project associated with the attestors, in the format `projects/*`."##),
Some(true),
Some(false)),
@@ -1255,16 +1378,12 @@ fn main() {
Some(false)),
]),
("attestors-set-iam-policy",
Some(r##"Sets the access control policy on the specified resource. Replaces any
existing policy.
Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors."##),
Some(r##"Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-set-iam-policy",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy is being specified.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy is being specified. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1287,19 +1406,12 @@ fn main() {
Some(false)),
]),
("attestors-test-iam-permissions",
Some(r##"Returns permissions that a caller has on the specified resource.
If the resource does not exist, this will return an empty set of
permissions, not a `NOT_FOUND` error.
Note: This operation is designed to be used for building permission-aware
UIs and command-line tools, not for authorization checking. This operation
may "fail open" without warning."##),
Some(r##"Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-test-iam-permissions",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy detail is being requested.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy detail is being requested. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1322,14 +1434,40 @@ fn main() {
Some(false)),
]),
("attestors-update",
Some(r##"Updates an attestor.
Returns NOT_FOUND if the attestor does not exist."##),
Some(r##"Updates an attestor. Returns NOT_FOUND if the attestor does not exist."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-update",
vec![
(Some(r##"name"##),
None,
Some(r##"Required. The resource name, in the format:
`projects/*/attestors/*`. This field may not be updated."##),
Some(r##"Required. The resource name, in the format: `projects/*/attestors/*`. This field may not be updated."##),
Some(true),
Some(false)),
(Some(r##"kv"##),
Some(r##"r"##),
Some(r##"Set various fields of the request structure, matching the key=value form"##),
Some(true),
Some(true)),
(Some(r##"v"##),
Some(r##"p"##),
Some(r##"Set various optional parameters, matching the key=value form"##),
Some(false),
Some(true)),
(Some(r##"out"##),
Some(r##"o"##),
Some(r##"Specify the file into which to write the program's output"##),
Some(false),
Some(false)),
]),
("attestors-validate-attestation-occurrence",
Some(r##"Returns whether the given Attestation for the given image URI was signed by the given Attestor"##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_attestors-validate-attestation-occurrence",
vec![
(Some(r##"attestor"##),
None,
Some(r##"Required. The resource name of the Attestor of the occurrence, in the format `projects/*/attestors/*`."##),
Some(true),
Some(false)),
@@ -1352,19 +1490,12 @@ fn main() {
Some(false)),
]),
("get-policy",
Some(r##"A policy specifies the attestors that must attest to
a container image, before the project is allowed to deploy that
image. There is at most one policy per project. All image admission
requests are permitted if a project has no policy.
Gets the policy for this project. Returns a default
policy if the project does not have one."##),
Some(r##"A policy specifies the attestors that must attest to a container image, before the project is allowed to deploy that image. There is at most one policy per project. All image admission requests are permitted if a project has no policy. Gets the policy for this project. Returns a default policy if the project does not have one."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_get-policy",
vec![
(Some(r##"name"##),
None,
Some(r##"Required. The resource name of the policy to retrieve,
in the format `projects/*/policy`."##),
Some(r##"Required. The resource name of the policy to retrieve, in the format `projects/*/policy`."##),
Some(true),
Some(false)),
@@ -1381,15 +1512,12 @@ fn main() {
Some(false)),
]),
("policy-get-iam-policy",
Some(r##"Gets the access control policy for a resource.
Returns an empty policy if the resource exists and does not have a policy
set."##),
Some(r##"Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_policy-get-iam-policy",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy is being requested.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy is being requested. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1406,16 +1534,12 @@ fn main() {
Some(false)),
]),
("policy-set-iam-policy",
Some(r##"Sets the access control policy on the specified resource. Replaces any
existing policy.
Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors."##),
Some(r##"Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_policy-set-iam-policy",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy is being specified.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy is being specified. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1438,19 +1562,12 @@ fn main() {
Some(false)),
]),
("policy-test-iam-permissions",
Some(r##"Returns permissions that a caller has on the specified resource.
If the resource does not exist, this will return an empty set of
permissions, not a `NOT_FOUND` error.
Note: This operation is designed to be used for building permission-aware
UIs and command-line tools, not for authorization checking. This operation
may "fail open" without warning."##),
Some(r##"Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_policy-test-iam-permissions",
vec![
(Some(r##"resource"##),
None,
Some(r##"REQUIRED: The resource for which the policy detail is being requested.
See the operation documentation for the appropriate value for this field."##),
Some(r##"REQUIRED: The resource for which the policy detail is being requested. See the operation documentation for the appropriate value for this field."##),
Some(true),
Some(false)),
@@ -1473,17 +1590,12 @@ fn main() {
Some(false)),
]),
("update-policy",
Some(r##"Creates or updates a project's policy, and returns a copy of the
new policy. A policy is always updated as a whole, to avoid race
conditions with concurrent policy enforcement (or management!)
requests. Returns NOT_FOUND if the project does not exist, INVALID_ARGUMENT
if the request is malformed."##),
Some(r##"Creates or updates a project's policy, and returns a copy of the new policy. A policy is always updated as a whole, to avoid race conditions with concurrent policy enforcement (or management!) requests. Returns NOT_FOUND if the project does not exist, INVALID_ARGUMENT if the request is malformed."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/projects_update-policy",
vec![
(Some(r##"name"##),
None,
Some(r##"Output only. The resource name, in the format `projects/*/policy`. There is
at most one policy per project."##),
Some(r##"Output only. The resource name, in the format `projects/*/policy`. There is at most one policy per project."##),
Some(true),
Some(false)),
@@ -1507,13 +1619,37 @@ fn main() {
]),
]),
("systempolicy", "methods: 'get-policy'", vec![
("get-policy",
Some(r##"Gets the current system policy in the specified location."##),
"Details at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli/systempolicy_get-policy",
vec![
(Some(r##"name"##),
None,
Some(r##"Required. The resource name, in the format `locations/*/policy`. Note that the system policy is not associated with a project."##),
Some(true),
Some(false)),
(Some(r##"v"##),
Some(r##"p"##),
Some(r##"Set various optional parameters, matching the key=value form"##),
Some(false),
Some(true)),
(Some(r##"out"##),
Some(r##"o"##),
Some(r##"Specify the file into which to write the program's output"##),
Some(false),
Some(false)),
]),
]),
];
let mut app = App::new("binaryauthorization1")
.author("Sebastian Thiel <byronimo@gmail.com>")
.version("1.0.14+20200619")
.about("The management interface for Binary Authorization, a system providing policy control for images deployed to Kubernetes Engine clusters.
")
.version("2.0.0+20210318")
.about("The management interface for Binary Authorization, a system providing policy control for images deployed to Kubernetes Engine clusters. ")
.after_help("All documentation details can be found at http://byron.github.io/google-apis-rs/google_binaryauthorization1_cli")
.arg(Arg::with_name("url")
.long("scope")
@@ -1527,12 +1663,7 @@ fn main() {
.takes_value(true))
.arg(Arg::with_name("debug")
.long("debug")
.help("Output all server communication to standard error. `tx` and `rx` are placed into the same stream.")
.multiple(false)
.takes_value(false))
.arg(Arg::with_name("debug-auth")
.long("debug-auth")
.help("Output all communication related to authentication to standard error. `tx` and `rx` are placed into the same stream.")
.help("Debug print all errors")
.multiple(false)
.takes_value(false));
@@ -1580,13 +1711,13 @@ fn main() {
let matches = app.get_matches();
let debug = matches.is_present("debug");
match Engine::new(matches) {
match Engine::new(matches).await {
Err(err) => {
exit_status = err.exit_code;
writeln!(io::stderr(), "{}", err).ok();
},
Ok(engine) => {
if let Err(doit_err) = engine.doit() {
if let Err(doit_err) = engine.doit().await {
exit_status = 1;
match doit_err {
DoitError::IoError(path, err) => {
@@ -1605,4 +1736,4 @@ fn main() {
}
std::process::exit(exit_status);
}
}