189
vendor/github.com/elastic/go-elasticsearch/v6/esapi/api.xpack.xpack.security.delete_privileges.go
generated
vendored
Normal file
189
vendor/github.com/elastic/go-elasticsearch/v6/esapi/api.xpack.xpack.security.delete_privileges.go
generated
vendored
Normal file
@@ -0,0 +1,189 @@
|
||||
// Code generated from specification version 6.8.2: DO NOT EDIT
|
||||
|
||||
package esapi
|
||||
|
||||
import (
|
||||
"context"
|
||||
"net/http"
|
||||
"strings"
|
||||
)
|
||||
|
||||
func newXPackSecurityDeletePrivilegesFunc(t Transport) XPackSecurityDeletePrivileges {
|
||||
return func(name string, application string, o ...func(*XPackSecurityDeletePrivilegesRequest)) (*Response, error) {
|
||||
var r = XPackSecurityDeletePrivilegesRequest{Name: name, Application: application}
|
||||
for _, f := range o {
|
||||
f(&r)
|
||||
}
|
||||
return r.Do(r.ctx, t)
|
||||
}
|
||||
}
|
||||
|
||||
// ----- API Definition -------------------------------------------------------
|
||||
|
||||
// XPackSecurityDeletePrivileges - TODO
|
||||
//
|
||||
type XPackSecurityDeletePrivileges func(name string, application string, o ...func(*XPackSecurityDeletePrivilegesRequest)) (*Response, error)
|
||||
|
||||
// XPackSecurityDeletePrivilegesRequest configures the X Pack Security Delete Privileges API request.
|
||||
//
|
||||
type XPackSecurityDeletePrivilegesRequest struct {
|
||||
Application string
|
||||
Name string
|
||||
|
||||
Refresh string
|
||||
|
||||
Pretty bool
|
||||
Human bool
|
||||
ErrorTrace bool
|
||||
FilterPath []string
|
||||
|
||||
Header http.Header
|
||||
|
||||
ctx context.Context
|
||||
}
|
||||
|
||||
// Do executes the request and returns response or error.
|
||||
//
|
||||
func (r XPackSecurityDeletePrivilegesRequest) Do(ctx context.Context, transport Transport) (*Response, error) {
|
||||
var (
|
||||
method string
|
||||
path strings.Builder
|
||||
params map[string]string
|
||||
)
|
||||
|
||||
method = "DELETE"
|
||||
|
||||
path.Grow(1 + len("_xpack") + 1 + len("security") + 1 + len("privilege") + 1 + len(r.Application) + 1 + len(r.Name))
|
||||
path.WriteString("/")
|
||||
path.WriteString("_xpack")
|
||||
path.WriteString("/")
|
||||
path.WriteString("security")
|
||||
path.WriteString("/")
|
||||
path.WriteString("privilege")
|
||||
path.WriteString("/")
|
||||
path.WriteString(r.Application)
|
||||
path.WriteString("/")
|
||||
path.WriteString(r.Name)
|
||||
|
||||
params = make(map[string]string)
|
||||
|
||||
if r.Refresh != "" {
|
||||
params["refresh"] = r.Refresh
|
||||
}
|
||||
|
||||
if r.Pretty {
|
||||
params["pretty"] = "true"
|
||||
}
|
||||
|
||||
if r.Human {
|
||||
params["human"] = "true"
|
||||
}
|
||||
|
||||
if r.ErrorTrace {
|
||||
params["error_trace"] = "true"
|
||||
}
|
||||
|
||||
if len(r.FilterPath) > 0 {
|
||||
params["filter_path"] = strings.Join(r.FilterPath, ",")
|
||||
}
|
||||
|
||||
req, _ := newRequest(method, path.String(), nil)
|
||||
|
||||
if len(params) > 0 {
|
||||
q := req.URL.Query()
|
||||
for k, v := range params {
|
||||
q.Set(k, v)
|
||||
}
|
||||
req.URL.RawQuery = q.Encode()
|
||||
}
|
||||
|
||||
if len(r.Header) > 0 {
|
||||
if len(req.Header) == 0 {
|
||||
req.Header = r.Header
|
||||
} else {
|
||||
for k, vv := range r.Header {
|
||||
for _, v := range vv {
|
||||
req.Header.Add(k, v)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if ctx != nil {
|
||||
req = req.WithContext(ctx)
|
||||
}
|
||||
|
||||
res, err := transport.Perform(req)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
response := Response{
|
||||
StatusCode: res.StatusCode,
|
||||
Body: res.Body,
|
||||
Header: res.Header,
|
||||
}
|
||||
|
||||
return &response, nil
|
||||
}
|
||||
|
||||
// WithContext sets the request context.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithContext(v context.Context) func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.ctx = v
|
||||
}
|
||||
}
|
||||
|
||||
// WithRefresh - if `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes..
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithRefresh(v string) func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.Refresh = v
|
||||
}
|
||||
}
|
||||
|
||||
// WithPretty makes the response body pretty-printed.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithPretty() func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.Pretty = true
|
||||
}
|
||||
}
|
||||
|
||||
// WithHuman makes statistical values human-readable.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithHuman() func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.Human = true
|
||||
}
|
||||
}
|
||||
|
||||
// WithErrorTrace includes the stack trace for errors in the response body.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithErrorTrace() func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.ErrorTrace = true
|
||||
}
|
||||
}
|
||||
|
||||
// WithFilterPath filters the properties of the response body.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithFilterPath(v ...string) func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
r.FilterPath = v
|
||||
}
|
||||
}
|
||||
|
||||
// WithHeader adds the headers to the HTTP request.
|
||||
//
|
||||
func (f XPackSecurityDeletePrivileges) WithHeader(h map[string]string) func(*XPackSecurityDeletePrivilegesRequest) {
|
||||
return func(r *XPackSecurityDeletePrivilegesRequest) {
|
||||
if r.Header == nil {
|
||||
r.Header = make(http.Header)
|
||||
}
|
||||
for k, v := range h {
|
||||
r.Header.Add(k, v)
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user