// DO NOT EDIT ! // This file was generated automatically from 'src/mako/cli/main.rs.mako' // DO NOT EDIT ! #![feature(plugin, exit_status)] #![plugin(docopt_macros)] #![allow(unused_variables, unused_imports, dead_code, unused_mut)] extern crate docopt; extern crate yup_oauth2 as oauth2; extern crate yup_hyper_mock as mock; extern crate rustc_serialize; extern crate serde; extern crate hyper; extern crate mime; extern crate google_replicapool1_beta2 as api; use std::env; use std::io::{self, Write}; docopt!(Options derive Debug, " Usage: replicapool1-beta2 [options] instance-group-managers abandon-instances -r ... [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers delete [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers delete-instances -r ... [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers get [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers insert -r ... [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers list [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers recreate-instances -r ... [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers resize [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers set-instance-template -r ... [-p ...] [-o ] replicapool1-beta2 [options] instance-group-managers set-target-pools -r ... [-p ...] [-o ] replicapool1-beta2 [options] zone-operations get [-p ...] [-o ] replicapool1-beta2 [options] zone-operations list [-p ...] [-o ] replicapool1-beta2 --help All documentation details can be found at http://byron.github.io/google-apis-rs/google_replicapool1_beta2_cli/index.html Configuration: --scope Specify the authentication a method should be executed in. Each scope requires the user to grant this application permission to use it. If unset, it defaults to the shortest scope url for a particular method. --config-dir A directory into which we will store our persistent data. Defaults to a user-writable directory that we will create during the first invocation. [default: ~/.google-service-cli] --debug Output all server communication to standard error. `tx` and `rx` are placed into the same stream. --debug-auth Output all communication related to authentication to standard error. `tx` and `rx` are placed into the same stream. "); mod cmn; use cmn::{InvalidOptionsError, CLIError, JsonTokenStorage, arg_from_str, writer_from_opts, parse_kv_arg, input_file_from_opts, input_mime_from_opts, FieldCursor, FieldError}; use std::default::Default; use std::str::FromStr; use oauth2::{Authenticator, DefaultAuthenticatorDelegate}; use rustc_serialize::json; struct Engine { opt: Options, hub: api::Replicapool>, } impl Engine { fn _instance_group_managers_abandon_instances(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManagersAbandonInstancesRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "instances" => { if request.instances.is_none() { request.instances = Some(Default::default()); } request.instances.as_mut().unwrap().push(value.unwrap_or("").to_string()); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let mut call = self.hub.instance_group_managers().abandon_instances(request, &self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_delete(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.instance_group_managers().delete(&self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_delete_instances(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManagersDeleteInstancesRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "instances" => { if request.instances.is_none() { request.instances = Some(Default::default()); } request.instances.as_mut().unwrap().push(value.unwrap_or("").to_string()); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let mut call = self.hub.instance_group_managers().delete_instances(request, &self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_get(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.instance_group_managers().get(&self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_insert(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManager::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "target-size" => { request.target_size = Some(arg_from_str(value.unwrap_or("-0"), err, "target-size", "integer")); }, "group" => { request.group = Some(value.unwrap_or("").to_string()); }, "description" => { request.description = Some(value.unwrap_or("").to_string()); }, "target-pools" => { if request.target_pools.is_none() { request.target_pools = Some(Default::default()); } request.target_pools.as_mut().unwrap().push(value.unwrap_or("").to_string()); }, "kind" => { request.kind = Some(value.unwrap_or("").to_string()); }, "name" => { request.name = Some(value.unwrap_or("").to_string()); }, "base-instance-name" => { request.base_instance_name = Some(value.unwrap_or("").to_string()); }, "fingerprint" => { request.fingerprint = Some(value.unwrap_or("").to_string()); }, "instance-template" => { request.instance_template = Some(value.unwrap_or("").to_string()); }, "creation-timestamp" => { request.creation_timestamp = Some(value.unwrap_or("").to_string()); }, "id" => { request.id = Some(value.unwrap_or("").to_string()); }, "self-link" => { request.self_link = Some(value.unwrap_or("").to_string()); }, "current-size" => { request.current_size = Some(arg_from_str(value.unwrap_or("-0"), err, "current-size", "integer")); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let size: i32 = arg_from_str(&self.opt.arg_size, err, "", "integer"); let mut call = self.hub.instance_group_managers().insert(request, &self.opt.arg_project, &self.opt.arg_zone, size); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_list(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.instance_group_managers().list(&self.opt.arg_project, &self.opt.arg_zone); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "page-token" => { call = call.page_token(value.unwrap_or("")); }, "max-results" => { call = call.max_results(arg_from_str(value.unwrap_or("-0"), err, "max-results", "integer")); }, "filter" => { call = call.filter(value.unwrap_or("")); }, "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_recreate_instances(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManagersRecreateInstancesRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "instances" => { if request.instances.is_none() { request.instances = Some(Default::default()); } request.instances.as_mut().unwrap().push(value.unwrap_or("").to_string()); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let mut call = self.hub.instance_group_managers().recreate_instances(request, &self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_resize(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let size: i32 = arg_from_str(&self.opt.arg_size, err, "", "integer"); let mut call = self.hub.instance_group_managers().resize(&self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager, size); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_set_instance_template(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManagersSetInstanceTemplateRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "instance-template" => { request.instance_template = Some(value.unwrap_or("").to_string()); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let mut call = self.hub.instance_group_managers().set_instance_template(request, &self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _instance_group_managers_set_target_pools(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut request = api::InstanceGroupManagersSetTargetPoolsRequest::default(); let mut field_cursor = FieldCursor::default(); for kvarg in self.opt.arg_kv.iter() { let last_errc = err.issues.len(); let (key, value) = parse_kv_arg(&*kvarg, err, false); let mut temp_cursor = field_cursor.clone(); if let Err(field_err) = temp_cursor.set(&*key) { err.issues.push(field_err); } if value.is_none() { field_cursor = temp_cursor.clone(); if err.issues.len() > last_errc { err.issues.remove(last_errc); } continue; } match &temp_cursor.to_string()[..] { "target-pools" => { if request.target_pools.is_none() { request.target_pools = Some(Default::default()); } request.target_pools.as_mut().unwrap().push(value.unwrap_or("").to_string()); }, "fingerprint" => { request.fingerprint = Some(value.unwrap_or("").to_string()); }, _ => { err.issues.push(CLIError::Field(FieldError::Unknown(temp_cursor.to_string()))); } } } let mut call = self.hub.instance_group_managers().set_target_pools(request, &self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_instance_group_manager); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _zone_operations_get(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.zone_operations().get(&self.opt.arg_project, &self.opt.arg_zone, &self.opt.arg_operation); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _zone_operations_list(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.zone_operations().list(&self.opt.arg_project, &self.opt.arg_zone); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err, false); match key { "page-token" => { call = call.page_token(value.unwrap_or("")); }, "max-results" => { call = call.max_results(arg_from_str(value.unwrap_or("-0"), err, "max-results", "integer")); }, "filter" => { call = call.filter(value.unwrap_or("")); }, "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); if self.opt.flag_scope.len() > 0 { call = call.add_scope(&self.opt.flag_scope); } let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { serde::json::to_writer_pretty(&mut ostream, &output_schema).unwrap(); None } } } } fn _doit(&self, dry_run: bool) -> (Option, Option) { let mut err = InvalidOptionsError::new(); let mut call_result: Option; let mut err_opt: Option = None; if self.opt.cmd_instance_group_managers { if self.opt.cmd_abandon_instances { call_result = self._instance_group_managers_abandon_instances(dry_run, &mut err); } else if self.opt.cmd_delete { call_result = self._instance_group_managers_delete(dry_run, &mut err); } else if self.opt.cmd_delete_instances { call_result = self._instance_group_managers_delete_instances(dry_run, &mut err); } else if self.opt.cmd_get { call_result = self._instance_group_managers_get(dry_run, &mut err); } else if self.opt.cmd_insert { call_result = self._instance_group_managers_insert(dry_run, &mut err); } else if self.opt.cmd_list { call_result = self._instance_group_managers_list(dry_run, &mut err); } else if self.opt.cmd_recreate_instances { call_result = self._instance_group_managers_recreate_instances(dry_run, &mut err); } else if self.opt.cmd_resize { call_result = self._instance_group_managers_resize(dry_run, &mut err); } else if self.opt.cmd_set_instance_template { call_result = self._instance_group_managers_set_instance_template(dry_run, &mut err); } else if self.opt.cmd_set_target_pools { call_result = self._instance_group_managers_set_target_pools(dry_run, &mut err); } else { unreachable!(); } } else if self.opt.cmd_zone_operations { if self.opt.cmd_get { call_result = self._zone_operations_get(dry_run, &mut err); } else if self.opt.cmd_list { call_result = self._zone_operations_list(dry_run, &mut err); } else { unreachable!(); } } else { unreachable!(); } if dry_run { if err.issues.len() > 0 { err_opt = Some(err); } } (call_result, err_opt) } // Please note that this call will fail if any part of the opt can't be handled fn new(opt: Options) -> Result { let (config_dir, secret) = { let config_dir = match cmn::assure_config_dir_exists(&opt.flag_config_dir) { Err(e) => return Err(InvalidOptionsError::single(e, 3)), Ok(p) => p, }; match cmn::application_secret_from_directory(&config_dir, "replicapool1-beta2-secret.json", "{\"installed\":{\"auth_uri\":\"https://accounts.google.com/o/oauth2/auth\",\"client_secret\":\"hCsslbCUyfehWMmbkG8vTYxG\",\"token_uri\":\"https://accounts.google.com/o/oauth2/token\",\"client_email\":\"\",\"redirect_uris\":[\"urn:ietf:wg:oauth:2.0:oob\",\"oob\"],\"client_x509_cert_url\":\"\",\"client_id\":\"620010449518-9ngf7o4dhs0dka470npqvor6dc5lqb9b.apps.googleusercontent.com\",\"auth_provider_x509_cert_url\":\"https://www.googleapis.com/oauth2/v1/certs\"}}") { Ok(secret) => (config_dir, secret), Err(e) => return Err(InvalidOptionsError::single(e, 4)) } }; let auth = Authenticator::new( &secret, DefaultAuthenticatorDelegate, if opt.flag_debug_auth { hyper::Client::with_connector(mock::TeeConnector { connector: hyper::net::HttpConnector(None) }) } else { hyper::Client::new() }, JsonTokenStorage { program_name: "replicapool1-beta2", db_dir: config_dir.clone(), }, None); let client = if opt.flag_debug { hyper::Client::with_connector(mock::TeeConnector { connector: hyper::net::HttpConnector(None) }) } else { hyper::Client::new() }; let engine = Engine { opt: opt, hub: api::Replicapool::new(client, auth), }; match engine._doit(true) { (_, Some(err)) => Err(err), _ => Ok(engine), } } // Execute the call with all the bells and whistles, informing the caller only if there was an error. // The absense of one indicates success. fn doit(&self) -> Option { self._doit(false).0 } } fn main() { let opts: Options = Options::docopt().decode().unwrap_or_else(|e| e.exit()); let debug = opts.flag_debug; match Engine::new(opts) { Err(err) => { writeln!(io::stderr(), "{}", err).ok(); env::set_exit_status(err.exit_code); }, Ok(engine) => { if let Some(err) = engine.doit() { if debug { writeln!(io::stderr(), "{:?}", err).ok(); } else { writeln!(io::stderr(), "{}", err).ok(); } env::set_exit_status(1); } } } }