podman_autogen_api/apis/
secrets_compat_api.rs

1/*
2 * supports a RESTful API for the Libpod library
3 *
4 * This documentation describes the Podman v2.x+ RESTful API. It consists of a Docker-compatible API and a Libpod API providing support for Podman’s unique features such as pods.  To start the service and keep it running for 5,000 seconds (-t 0 runs forever):  podman system service -t 5000 &  You can then use cURL on the socket using requests documented below.  NOTE: if you install the package podman-docker, it will create a symbolic link for /run/docker.sock to /run/podman/podman.sock  NOTE: Some fields in the API response JSON are encoded as omitempty, which means that if said field has a zero value, they will not be encoded in the API response. This is a feature to help reduce the size of the JSON responses returned via the API.  NOTE: Due to the limitations of [go-swagger](https://github.com/go-swagger/go-swagger), some field values that have a complex type show up as null in the docs as well as in the API responses. This is because the zero value for the field type is null. The field description in the docs will state what type the field is expected to be for such cases.  See podman-system-service(1) for more information.  Quick Examples:  'podman info'  curl --unix-socket /run/podman/podman.sock http://d/v5.0.0/libpod/info  'podman pull quay.io/containers/podman'  curl -XPOST --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/images/create?fromImage=quay.io%2Fcontainers%2Fpodman'  'podman list images'  curl --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/libpod/images/json' | jq
5 *
6 * The version of the OpenAPI document: 5.0.0
7 * Contact: podman@lists.podman.io
8 * Generated by: https://openapi-generator.tech
9 */
10
11use std::borrow::Borrow;
12#[allow(unused_imports)]
13use std::option::Option;
14use std::pin::Pin;
15use std::sync::Arc;
16
17use futures::Future;
18use hyper;
19use hyper_util::client::legacy::connect::Connect;
20
21use super::request as __internal_request;
22use super::{configuration, Error};
23use crate::models;
24
25pub struct SecretsCompatApiClient<C: Connect>
26where
27    C: Clone + std::marker::Send + Sync + 'static,
28{
29    configuration: Arc<configuration::Configuration<C>>,
30}
31
32impl<C: Connect> SecretsCompatApiClient<C>
33where
34    C: Clone + std::marker::Send + Sync,
35{
36    pub fn new(configuration: Arc<configuration::Configuration<C>>) -> SecretsCompatApiClient<C> {
37        SecretsCompatApiClient { configuration }
38    }
39}
40
41pub trait SecretsCompatApi: Send + Sync {
42    fn secret_create(
43        &self,
44        create: Option<models::SecretCreate>,
45    ) -> Pin<Box<dyn Future<Output = Result<models::SecretCreateLibpod201Response, Error>> + Send>>;
46    fn secret_delete(&self, name: &str) -> Pin<Box<dyn Future<Output = Result<(), Error>> + Send>>;
47    fn secret_inspect(
48        &self,
49        name: &str,
50    ) -> Pin<Box<dyn Future<Output = Result<models::SecretInfoReportCompat, Error>> + Send>>;
51    fn secret_list(
52        &self,
53        filters: Option<&str>,
54    ) -> Pin<Box<dyn Future<Output = Result<Vec<models::SecretInfoReportCompat>, Error>> + Send>>;
55}
56
57impl<C: Connect> SecretsCompatApi for SecretsCompatApiClient<C>
58where
59    C: Clone + std::marker::Send + Sync,
60{
61    #[allow(unused_mut)]
62    fn secret_create(
63        &self,
64        create: Option<models::SecretCreate>,
65    ) -> Pin<Box<dyn Future<Output = Result<models::SecretCreateLibpod201Response, Error>> + Send>>
66    {
67        let mut req =
68            __internal_request::Request::new(hyper::Method::POST, "/secrets/create".to_string());
69        req = req.with_body_param(create);
70
71        req.execute(self.configuration.borrow())
72    }
73
74    #[allow(unused_mut)]
75    fn secret_delete(&self, name: &str) -> Pin<Box<dyn Future<Output = Result<(), Error>> + Send>> {
76        let mut req =
77            __internal_request::Request::new(hyper::Method::DELETE, "/secrets/{name}".to_string());
78        req = req.with_path_param("name".to_string(), name.to_string());
79        req = req.returns_nothing();
80
81        req.execute(self.configuration.borrow())
82    }
83
84    #[allow(unused_mut)]
85    fn secret_inspect(
86        &self,
87        name: &str,
88    ) -> Pin<Box<dyn Future<Output = Result<models::SecretInfoReportCompat, Error>> + Send>> {
89        let mut req =
90            __internal_request::Request::new(hyper::Method::GET, "/secrets/{name}".to_string());
91        req = req.with_path_param("name".to_string(), name.to_string());
92
93        req.execute(self.configuration.borrow())
94    }
95
96    #[allow(unused_mut)]
97    fn secret_list(
98        &self,
99        filters: Option<&str>,
100    ) -> Pin<Box<dyn Future<Output = Result<Vec<models::SecretInfoReportCompat>, Error>> + Send>>
101    {
102        let mut req = __internal_request::Request::new(hyper::Method::GET, "/secrets".to_string());
103        if let Some(ref s) = filters {
104            let query_value = s.to_string();
105            req = req.with_query_param("filters".to_string(), query_value);
106        }
107
108        req.execute(self.configuration.borrow())
109    }
110}