podman_autogen_api/apis/
secrets_compat_api.rs1use std::borrow::Borrow;
12#[allow(unused_imports)]
13use std::option::Option;
14use std::pin::Pin;
15use std::sync::Arc;
16
17use futures::Future;
18use hyper;
19use hyper_util::client::legacy::connect::Connect;
20
21use super::request as __internal_request;
22use super::{configuration, Error};
23use crate::models;
24
25pub struct SecretsCompatApiClient<C: Connect>
26where
27 C: Clone + std::marker::Send + Sync + 'static,
28{
29 configuration: Arc<configuration::Configuration<C>>,
30}
31
32impl<C: Connect> SecretsCompatApiClient<C>
33where
34 C: Clone + std::marker::Send + Sync,
35{
36 pub fn new(configuration: Arc<configuration::Configuration<C>>) -> SecretsCompatApiClient<C> {
37 SecretsCompatApiClient { configuration }
38 }
39}
40
41pub trait SecretsCompatApi: Send + Sync {
42 fn secret_create(
43 &self,
44 create: Option<models::SecretCreate>,
45 ) -> Pin<Box<dyn Future<Output = Result<models::SecretCreateLibpod201Response, Error>> + Send>>;
46 fn secret_delete(&self, name: &str) -> Pin<Box<dyn Future<Output = Result<(), Error>> + Send>>;
47 fn secret_inspect(
48 &self,
49 name: &str,
50 ) -> Pin<Box<dyn Future<Output = Result<models::SecretInfoReportCompat, Error>> + Send>>;
51 fn secret_list(
52 &self,
53 filters: Option<&str>,
54 ) -> Pin<Box<dyn Future<Output = Result<Vec<models::SecretInfoReportCompat>, Error>> + Send>>;
55}
56
57impl<C: Connect> SecretsCompatApi for SecretsCompatApiClient<C>
58where
59 C: Clone + std::marker::Send + Sync,
60{
61 #[allow(unused_mut)]
62 fn secret_create(
63 &self,
64 create: Option<models::SecretCreate>,
65 ) -> Pin<Box<dyn Future<Output = Result<models::SecretCreateLibpod201Response, Error>> + Send>>
66 {
67 let mut req =
68 __internal_request::Request::new(hyper::Method::POST, "/secrets/create".to_string());
69 req = req.with_body_param(create);
70
71 req.execute(self.configuration.borrow())
72 }
73
74 #[allow(unused_mut)]
75 fn secret_delete(&self, name: &str) -> Pin<Box<dyn Future<Output = Result<(), Error>> + Send>> {
76 let mut req =
77 __internal_request::Request::new(hyper::Method::DELETE, "/secrets/{name}".to_string());
78 req = req.with_path_param("name".to_string(), name.to_string());
79 req = req.returns_nothing();
80
81 req.execute(self.configuration.borrow())
82 }
83
84 #[allow(unused_mut)]
85 fn secret_inspect(
86 &self,
87 name: &str,
88 ) -> Pin<Box<dyn Future<Output = Result<models::SecretInfoReportCompat, Error>> + Send>> {
89 let mut req =
90 __internal_request::Request::new(hyper::Method::GET, "/secrets/{name}".to_string());
91 req = req.with_path_param("name".to_string(), name.to_string());
92
93 req.execute(self.configuration.borrow())
94 }
95
96 #[allow(unused_mut)]
97 fn secret_list(
98 &self,
99 filters: Option<&str>,
100 ) -> Pin<Box<dyn Future<Output = Result<Vec<models::SecretInfoReportCompat>, Error>> + Send>>
101 {
102 let mut req = __internal_request::Request::new(hyper::Method::GET, "/secrets".to_string());
103 if let Some(ref s) = filters {
104 let query_value = s.to_string();
105 req = req.with_query_param("filters".to_string(), query_value);
106 }
107
108 req.execute(self.configuration.borrow())
109 }
110}