// DO NOT EDIT ! // This file was generated automatically from 'src/mako/cli/main.rs.mako' // DO NOT EDIT ! #![feature(plugin, exit_status)] #![allow(unused_variables, unused_imports, dead_code, unused_mut)] #[macro_use] extern crate clap; extern crate yup_oauth2 as oauth2; extern crate yup_hyper_mock as mock; extern crate serde; extern crate hyper; extern crate mime; extern crate strsim; extern crate google_container1_beta1 as api; use std::env; use std::io::{self, Write}; use clap::{App, SubCommand, Arg}; mod cmn; use cmn::{InvalidOptionsError, CLIError, JsonTokenStorage, arg_from_str, writer_from_opts, parse_kv_arg, input_file_from_opts, input_mime_from_opts, FieldCursor, FieldError, CallType, UploadProtocol, calltype_from_str, remove_json_null_values}; use std::default::Default; use std::str::FromStr; use oauth2::{Authenticator, DefaultAuthenticatorDelegate}; use serde::json; use clap::ArgMatches; enum DoitError { IoError(String, io::Error), ApiError(api::Error), } struct Engine<'n, 'a> { opt: ArgMatches<'n, 'a>, hub: api::Container>, gp: Vec<&'static str>, gpm: Vec<(&'static str, &'static str)>, } impl<'n, 'a> Engine<'n, 'a> { fn _projects_clusters_list(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().clusters_list(opt.value_of("project-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_operations_list(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().operations_list(opt.value_of("project-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_clusters_create(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut request = api::CreateClusterRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in opt.values_of("kv").unwrap_or(Vec::new()).iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } fn request_cluster_init(request: &mut api::CreateClusterRequest) { if request.cluster.is_none() { request.cluster = Some(Default::default()); } } fn request_cluster_master_auth_init(request: &mut api::CreateClusterRequest) { request_cluster_init(request); if request.cluster.as_mut().unwrap().master_auth.is_none() { request.cluster.as_mut().unwrap().master_auth = Some(Default::default()); } } fn request_cluster_node_config_init(request: &mut api::CreateClusterRequest) { request_cluster_init(request); if request.cluster.as_mut().unwrap().node_config.is_none() { request.cluster.as_mut().unwrap().node_config = Some(Default::default()); } } match &temp_cursor.to_string()[..] { "cluster.status" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().status = Some(value.unwrap_or("").to_string()); }, "cluster.container-ipv4-cidr" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().container_ipv4_cidr = Some(value.unwrap_or("").to_string()); }, "cluster.description" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().description = Some(value.unwrap_or("").to_string()); }, "cluster.zone" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().zone = Some(value.unwrap_or("").to_string()); }, "cluster.num-nodes" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().num_nodes = Some(arg_from_str(value.unwrap_or("-0"), err, "cluster.num-nodes", "integer")); }, "cluster.node-routing-prefix-size" => { request_cluster_init(&mut request); request.cluster.as_mut().unwrap().node_routing_prefix_size = Some(arg_from_str(value.unwrap_or("-0"), err, "cluster.node-routing-prefix-size", "integer")); }, "cluster.master-auth.bearer-token" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().master_auth.as_mut().unwrap().bearer_token = Some(value.unwrap_or("").to_string()); }, "cluster.master-auth.password" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().master_auth.as_mut().unwrap().password = Some(value.unwrap_or("").to_string()); }, "cluster.master-auth.user" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().master_auth.as_mut().unwrap().user = Some(value.unwrap_or("").to_string()); }, "cluster.cluster-api-version" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().cluster_api_version = Some(value.unwrap_or("").to_string()); }, "cluster.network" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().network = Some(value.unwrap_or("").to_string()); }, "cluster.endpoint" => { request_cluster_master_auth_init(&mut request); request.cluster.as_mut().unwrap().endpoint = Some(value.unwrap_or("").to_string()); }, "cluster.node-config.machine-type" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().node_config.as_mut().unwrap().machine_type = Some(value.unwrap_or("").to_string()); }, "cluster.node-config.source-image" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().node_config.as_mut().unwrap().source_image = Some(value.unwrap_or("").to_string()); }, "cluster.status-message" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().status_message = Some(value.unwrap_or("").to_string()); }, "cluster.services-ipv4-cidr" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().services_ipv4_cidr = Some(value.unwrap_or("").to_string()); }, "cluster.creation-timestamp" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().creation_timestamp = Some(value.unwrap_or("").to_string()); }, "cluster.enable-cloud-logging" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().enable_cloud_logging = Some(arg_from_str(value.unwrap_or("false"), err, "cluster.enable-cloud-logging", "boolean")); }, "cluster.self-link" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().self_link = Some(value.unwrap_or("").to_string()); }, "cluster.name" => { request_cluster_node_config_init(&mut request); request.cluster.as_mut().unwrap().name = Some(value.unwrap_or("").to_string()); }, _ => { let suggestion = FieldCursor::did_you_mean(key, &vec!["bearer-token", "cluster", "cluster-api-version", "container-ipv4-cidr", "creation-timestamp", "description", "enable-cloud-logging", "endpoint", "machine-type", "master-auth", "name", "network", "node-config", "node-routing-prefix-size", "num-nodes", "password", "self-link", "services-ipv4-cidr", "source-image", "status", "status-message", "user", "zone"]); err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string(), suggestion, value.map(|v| v.to_string())))); } } } let mut call = self.hub.projects().zones_clusters_create(request, opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_clusters_delete(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_clusters_delete(opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or(""), opt.value_of("cluster-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_clusters_get(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_clusters_get(opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or(""), opt.value_of("cluster-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_clusters_list(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_clusters_list(opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_operations_get(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_operations_get(opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or(""), opt.value_of("operation-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_operations_list(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_operations_list(opt.value_of("project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); for scope in self.opt.values_of("url").unwrap_or(Vec::new()).iter() { call = call.add_scope(scope); } let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _projects_zones_tokens_get(&self, opt: &ArgMatches<'n, 'a>, dry_run: bool, err: &mut InvalidOptionsError) -> Result<(), DoitError> { let mut call = self.hub.projects().zones_tokens_get(opt.value_of("master-project-id").unwrap_or(""), opt.value_of("zone-id").unwrap_or(""), opt.value_of("project-number").unwrap_or(""), opt.value_of("cluster-name").unwrap_or("")); for parg in opt.values_of("v").unwrap_or(Vec::new()).iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { _ => { let mut found = false; for param in &self.gp { if key == *param { found = true; call = call.param(self.gpm.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")); break; } } if !found { err.issues.push(CLIError::UnknownParameter(key.to_string(), Vec::new() + &self.gp + &[] )); } } } } let protocol = CallType::Standard; if dry_run { Ok(()) } else { assert!(err.issues.len() == 0); let mut ostream = match writer_from_opts(opt.value_of("out")) { Ok(mut f) => f, Err(io_err) => return Err(DoitError::IoError(opt.value_of("out").unwrap_or("-").to_string(), io_err)), }; match match protocol { CallType::Standard => call.doit(), _ => unreachable!() } { Err(api_err) => Err(DoitError::ApiError(api_err)), Ok((mut response, output_schema)) => { let mut value = json::value::to_value(&output_schema); remove_json_null_values(&mut value); serde::json::to_writer_pretty(&mut ostream, &value).unwrap(); Ok(()) } } } } fn _doit(&self, dry_run: bool) -> Result, Option> { let mut err = InvalidOptionsError::new(); let mut call_result: Result<(), DoitError> = Ok(()); let mut err_opt: Option = None; match self.opt.subcommand() { ("projects", Some(opt)) => { match opt.subcommand() { ("clusters-list", Some(opt)) => { call_result = self._projects_clusters_list(opt, dry_run, &mut err); }, ("operations-list", Some(opt)) => { call_result = self._projects_operations_list(opt, dry_run, &mut err); }, ("zones-clusters-create", Some(opt)) => { call_result = self._projects_zones_clusters_create(opt, dry_run, &mut err); }, ("zones-clusters-delete", Some(opt)) => { call_result = self._projects_zones_clusters_delete(opt, dry_run, &mut err); }, ("zones-clusters-get", Some(opt)) => { call_result = self._projects_zones_clusters_get(opt, dry_run, &mut err); }, ("zones-clusters-list", Some(opt)) => { call_result = self._projects_zones_clusters_list(opt, dry_run, &mut err); }, ("zones-operations-get", Some(opt)) => { call_result = self._projects_zones_operations_get(opt, dry_run, &mut err); }, ("zones-operations-list", Some(opt)) => { call_result = self._projects_zones_operations_list(opt, dry_run, &mut err); }, ("zones-tokens-get", Some(opt)) => { call_result = self._projects_zones_tokens_get(opt, dry_run, &mut err); }, _ => { err.issues.push(CLIError::MissingMethodError("projects".to_string())); writeln!(io::stderr(), "{}\n", opt.usage()).ok(); } } }, _ => { err.issues.push(CLIError::MissingCommandError); writeln!(io::stderr(), "{}\n", self.opt.usage()).ok(); } } if dry_run { if err.issues.len() > 0 { err_opt = Some(err); } Err(err_opt) } else { Ok(call_result) } } // Please note that this call will fail if any part of the opt can't be handled fn new(opt: ArgMatches<'a, 'n>) -> Result, InvalidOptionsError> { let (config_dir, secret) = { let config_dir = match cmn::assure_config_dir_exists(opt.value_of("folder").unwrap_or("~/.google-service-cli")) { Err(e) => return Err(InvalidOptionsError::single(e, 3)), Ok(p) => p, }; match cmn::application_secret_from_directory(&config_dir, "container1-beta1-secret.json", "{\"installed\":{\"auth_uri\":\"https://accounts.google.com/o/oauth2/auth\",\"client_secret\":\"hCsslbCUyfehWMmbkG8vTYxG\",\"token_uri\":\"https://accounts.google.com/o/oauth2/token\",\"client_email\":\"\",\"redirect_uris\":[\"urn:ietf:wg:oauth:2.0:oob\",\"oob\"],\"client_x509_cert_url\":\"\",\"client_id\":\"620010449518-9ngf7o4dhs0dka470npqvor6dc5lqb9b.apps.googleusercontent.com\",\"auth_provider_x509_cert_url\":\"https://www.googleapis.com/oauth2/v1/certs\"}}") { Ok(secret) => (config_dir, secret), Err(e) => return Err(InvalidOptionsError::single(e, 4)) } }; let auth = Authenticator::new( &secret, DefaultAuthenticatorDelegate, if opt.is_present("debug-auth") { hyper::Client::with_connector(mock::TeeConnector { connector: hyper::net::HttpConnector(None) }) } else { hyper::Client::new() }, JsonTokenStorage { program_name: "container1-beta1", db_dir: config_dir.clone(), }, None); let client = if opt.is_present("debug") { hyper::Client::with_connector(mock::TeeConnector { connector: hyper::net::HttpConnector(None) }) } else { hyper::Client::new() }; let engine = Engine { opt: opt, hub: api::Container::new(client, auth), gp: vec!["alt", "fields", "key", "oauth-token", "pretty-print", "quota-user", "user-ip"], gpm: vec![ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ] }; match engine._doit(true) { Err(Some(err)) => Err(err), Err(None) => Ok(engine), Ok(_) => unreachable!(), } } fn doit(&self) -> Result<(), DoitError> { match self._doit(false) { Ok(res) => res, Err(_) => unreachable!(), } } } fn main() { let arg_data = [ ("projects", "methods: 'clusters-list', 'operations-list', 'zones-clusters-create', 'zones-clusters-delete', 'zones-clusters-get', 'zones-clusters-list', 'zones-operations-get', 'zones-operations-list' and 'zones-tokens-get'", vec![ ("clusters-list", Some(r##"Lists all clusters owned by a project across all zones."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_clusters-list", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("operations-list", Some(r##"Lists all operations in a project, across all zones."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_operations-list", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-clusters-create", Some(r##"Creates a cluster, consisting of the specified number and type of Google Compute Engine instances, plus a Kubernetes master instance. The cluster is created in the project's default network. A firewall is added that allows traffic into port 443 on the master, which enables HTTPS. A firewall and a route is added for each node to allow the containers on that node to communicate with all other instances in the cluster. Finally, a route named k8s-iproute-10-xx-0-0 is created to track that the cluster's 10.xx.0.0/16 CIDR has been assigned."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-clusters-create", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone in which the cluster resides."##), Some(true), Some(false)), (Some(r##"kv"##), Some(r##"r"##), Some(r##"Set various fields of the request structure, matching the key=value form"##), Some(true), Some(true)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-clusters-delete", Some(r##"Deletes the cluster, including the Kubernetes master and all worker nodes. Firewalls and routes that were configured at cluster creation are also deleted."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-clusters-delete", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone in which the cluster resides."##), Some(true), Some(false)), (Some(r##"cluster-id"##), None, Some(r##"The name of the cluster to delete."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-clusters-get", Some(r##"Gets a specific cluster."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-clusters-get", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone in which the cluster resides."##), Some(true), Some(false)), (Some(r##"cluster-id"##), None, Some(r##"The name of the cluster to retrieve."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-clusters-list", Some(r##"Lists all clusters owned by a project in the specified zone."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-clusters-list", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone in which the cluster resides."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-operations-get", Some(r##"Gets the specified operation."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-operations-get", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone in which the operation resides. This is always the same zone as the cluster with which the operation is associated."##), Some(true), Some(false)), (Some(r##"operation-id"##), None, Some(r##"The server-assigned name of the operation."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-operations-list", Some(r##"Lists all operations in a project in a specific zone."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-operations-list", vec![ (Some(r##"project-id"##), None, Some(r##"The Google Developers Console project ID or project number."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The name of the Google Compute Engine zone to return operations for."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ("zones-tokens-get", Some(r##"Gets a compute-rw scoped OAuth2 access token for . Authentication is performed to ensure that the caller is a member of and that the request is coming from the expected master VM for the specified cluster. See go/gke-cross-project-auth for more details."##), "Details at http://byron.github.io/google-apis-rs/google_container1_beta1_cli/projects_zones-tokens-get", vec![ (Some(r##"master-project-id"##), None, Some(r##"The hosted master project from which this request is coming."##), Some(true), Some(false)), (Some(r##"zone-id"##), None, Some(r##"The zone of the specified cluster."##), Some(true), Some(false)), (Some(r##"project-number"##), None, Some(r##"The project number for which the access token is being requested."##), Some(true), Some(false)), (Some(r##"cluster-name"##), None, Some(r##"The name of the specified cluster."##), Some(true), Some(false)), (Some(r##"v"##), Some(r##"p"##), Some(r##"Set various optional parameters, matching the key=value form"##), Some(false), Some(true)), (Some(r##"out"##), Some(r##"o"##), Some(r##"Specify the file into which to write the program's output"##), Some(false), Some(false)), ]), ]), ]; let mut app = App::new("container1-beta1") .author("Sebastian Thiel ") .version("0.2.0+20150420") .about("The Google Container Engine API is used for building and managing container based applications, powered by the open source Kubernetes technology.") .after_help("All documentation details can be found at http://byron.github.io/google-apis-rs/google_container1_beta1_cli") .arg(Arg::with_name("url") .long("scope") .help("Specify the authentication a method should be executed in. Each scope requires the user to grant this application permission to use it.If unset, it defaults to the shortest scope url for a particular method.") .multiple(true) .takes_value(true)) .arg(Arg::with_name("folder") .long("config-dir") .help("A directory into which we will store our persistent data. Defaults to a user-writable directory that we will create during the first invocation.[default: ~/.google-service-cli") .multiple(false) .takes_value(true)) .arg(Arg::with_name("debug") .long("debug") .help("Output all server communication to standard error. `tx` and `rx` are placed into the same stream.") .multiple(false) .takes_value(false)) .arg(Arg::with_name("debug-auth") .long("debug-auth") .help("Output all communication related to authentication to standard error. `tx` and `rx` are placed into the same stream.") .multiple(false) .takes_value(false)); for &(main_command_name, ref about, ref subcommands) in arg_data.iter() { let mut mcmd = SubCommand::new(main_command_name).about(about); for &(sub_command_name, ref desc, url_info, ref args) in subcommands { let mut scmd = SubCommand::new(sub_command_name); if let &Some(desc) = desc { scmd = scmd.about(desc); } scmd = scmd.after_help(url_info); for &(ref arg_name, ref flag, ref desc, ref required, ref multi) in args { let arg_name_str = match (arg_name, flag) { (&Some(an), _ ) => an, (_ , &Some(f)) => f, _ => unreachable!(), }; let mut arg = Arg::with_name(arg_name_str); if let &Some(short_flag) = flag { arg = arg.short(short_flag); } if let &Some(desc) = desc { arg = arg.help(desc); } if arg_name.is_some() && flag.is_some() { arg = arg.takes_value(true); } if let &Some(required) = required { arg = arg.required(required); } if let &Some(multi) = multi { arg = arg.multiple(multi); } scmd = scmd.arg(arg); } mcmd = mcmd.subcommand(scmd); } app = app.subcommand(mcmd); } let matches = app.get_matches(); let debug = matches.is_present("debug"); match Engine::new(matches) { Err(err) => { env::set_exit_status(err.exit_code); writeln!(io::stderr(), "{}", err).ok(); }, Ok(engine) => { if let Err(doit_err) = engine.doit() { env::set_exit_status(1); match doit_err { DoitError::IoError(path, err) => { writeln!(io::stderr(), "Failed to open output file '{}': {}", path, err).ok(); }, DoitError::ApiError(err) => { if debug { writeln!(io::stderr(), "{:?}", err).ok(); } else { writeln!(io::stderr(), "{}", err).ok(); } } } } } } }