mirror of
https://github.com/nikdoof/vsphere-influxdb-go.git
synced 2025-12-22 15:09:22 +00:00
add vendoring with go dep
This commit is contained in:
73
vendor/github.com/vmware/govmomi/govc/role/create.go
generated
vendored
Normal file
73
vendor/github.com/vmware/govmomi/govc/role/create.go
generated
vendored
Normal file
@@ -0,0 +1,73 @@
|
||||
/*
|
||||
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package role
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/permissions"
|
||||
)
|
||||
|
||||
type create struct {
|
||||
*permissions.PermissionFlag
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("role.create", &create{})
|
||||
}
|
||||
|
||||
func (cmd *create) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.PermissionFlag, ctx = permissions.NewPermissionFlag(ctx)
|
||||
cmd.PermissionFlag.Register(ctx, f)
|
||||
}
|
||||
|
||||
func (cmd *create) Process(ctx context.Context) error {
|
||||
if err := cmd.PermissionFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *create) Usage() string {
|
||||
return "NAME [PRIVILEGE]..."
|
||||
}
|
||||
|
||||
func (cmd *create) Description() string {
|
||||
return `Create authorization role.
|
||||
|
||||
Optionally populate the role with the given PRIVILEGE(s).
|
||||
|
||||
Examples:
|
||||
govc role.create MyRole
|
||||
govc role.create NoDC $(govc role.ls Admin | grep -v Datacenter.)`
|
||||
}
|
||||
|
||||
func (cmd *create) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
if f.NArg() == 0 {
|
||||
return flag.ErrHelp
|
||||
}
|
||||
|
||||
m, err := cmd.Manager(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = m.AddRole(ctx, f.Arg(0), f.Args()[1:])
|
||||
return err
|
||||
}
|
||||
107
vendor/github.com/vmware/govmomi/govc/role/ls.go
generated
vendored
Normal file
107
vendor/github.com/vmware/govmomi/govc/role/ls.go
generated
vendored
Normal file
@@ -0,0 +1,107 @@
|
||||
/*
|
||||
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package role
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
"fmt"
|
||||
"io"
|
||||
"text/tabwriter"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/permissions"
|
||||
"github.com/vmware/govmomi/object"
|
||||
"github.com/vmware/govmomi/vim25/types"
|
||||
)
|
||||
|
||||
type ls struct {
|
||||
*permissions.PermissionFlag
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("role.ls", &ls{})
|
||||
}
|
||||
|
||||
func (cmd *ls) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.PermissionFlag, ctx = permissions.NewPermissionFlag(ctx)
|
||||
cmd.PermissionFlag.Register(ctx, f)
|
||||
}
|
||||
|
||||
func (cmd *ls) Process(ctx context.Context) error {
|
||||
if err := cmd.PermissionFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *ls) Usage() string {
|
||||
return "[NAME]"
|
||||
}
|
||||
|
||||
func (cmd *ls) Description() string {
|
||||
return `List authorization roles.
|
||||
|
||||
If NAME is provided, list privileges for the role.
|
||||
|
||||
Examples:
|
||||
govc role.ls
|
||||
govc role.ls Admin`
|
||||
}
|
||||
|
||||
type lsRoleList object.AuthorizationRoleList
|
||||
|
||||
func (rl lsRoleList) Write(w io.Writer) error {
|
||||
tw := tabwriter.NewWriter(w, 2, 0, 2, ' ', 0)
|
||||
|
||||
for _, role := range rl {
|
||||
fmt.Fprintf(tw, "%s\t%s\n", role.Name, role.Info.GetDescription().Summary)
|
||||
}
|
||||
|
||||
return tw.Flush()
|
||||
}
|
||||
|
||||
type lsRole types.AuthorizationRole
|
||||
|
||||
func (r lsRole) Write(w io.Writer) error {
|
||||
for _, p := range r.Privilege {
|
||||
fmt.Println(p)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *ls) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
if f.NArg() > 1 {
|
||||
return flag.ErrHelp
|
||||
}
|
||||
|
||||
_, err := cmd.Manager(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if f.NArg() == 1 {
|
||||
role, err := cmd.Role(f.Arg(0))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return cmd.WriteResult(lsRole(*role))
|
||||
}
|
||||
|
||||
return cmd.WriteResult(lsRoleList(cmd.Roles))
|
||||
}
|
||||
79
vendor/github.com/vmware/govmomi/govc/role/remove.go
generated
vendored
Normal file
79
vendor/github.com/vmware/govmomi/govc/role/remove.go
generated
vendored
Normal file
@@ -0,0 +1,79 @@
|
||||
/*
|
||||
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package role
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/permissions"
|
||||
)
|
||||
|
||||
type remove struct {
|
||||
*permissions.PermissionFlag
|
||||
|
||||
force bool
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("role.remove", &remove{})
|
||||
}
|
||||
|
||||
func (cmd *remove) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.PermissionFlag, ctx = permissions.NewPermissionFlag(ctx)
|
||||
cmd.PermissionFlag.Register(ctx, f)
|
||||
|
||||
f.BoolVar(&cmd.force, "force", false, "Force removal if role is in use")
|
||||
}
|
||||
|
||||
func (cmd *remove) Process(ctx context.Context) error {
|
||||
if err := cmd.PermissionFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *remove) Usage() string {
|
||||
return "NAME"
|
||||
}
|
||||
|
||||
func (cmd *remove) Description() string {
|
||||
return `Remove authorization role.
|
||||
|
||||
Examples:
|
||||
govc role.remove MyRole
|
||||
govc role.remove MyRole -force`
|
||||
}
|
||||
|
||||
func (cmd *remove) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
if f.NArg() != 1 {
|
||||
return flag.ErrHelp
|
||||
}
|
||||
|
||||
m, err := cmd.Manager(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
role, err := cmd.Role(f.Arg(0))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return m.RemoveRole(ctx, role.RoleId, !cmd.force)
|
||||
}
|
||||
112
vendor/github.com/vmware/govmomi/govc/role/update.go
generated
vendored
Normal file
112
vendor/github.com/vmware/govmomi/govc/role/update.go
generated
vendored
Normal file
@@ -0,0 +1,112 @@
|
||||
/*
|
||||
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package role
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/permissions"
|
||||
)
|
||||
|
||||
type update struct {
|
||||
*permissions.PermissionFlag
|
||||
|
||||
name string
|
||||
remove bool
|
||||
add bool
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("role.update", &update{})
|
||||
}
|
||||
|
||||
func (cmd *update) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.PermissionFlag, ctx = permissions.NewPermissionFlag(ctx)
|
||||
cmd.PermissionFlag.Register(ctx, f)
|
||||
|
||||
f.StringVar(&cmd.name, "name", "", "Change role name")
|
||||
f.BoolVar(&cmd.remove, "r", false, "Remove given PRIVILEGE(s)")
|
||||
f.BoolVar(&cmd.add, "a", false, "Add given PRIVILEGE(s)")
|
||||
}
|
||||
|
||||
func (cmd *update) Process(ctx context.Context) error {
|
||||
if err := cmd.PermissionFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *update) Usage() string {
|
||||
return "NAME [PRIVILEGE]..."
|
||||
}
|
||||
|
||||
func (cmd *update) Description() string {
|
||||
return `Update authorization role.
|
||||
|
||||
Set, Add or Remove role PRIVILEGE(s).
|
||||
|
||||
Examples:
|
||||
govc role.update MyRole $(govc role.ls Admin | grep VirtualMachine.)
|
||||
govc role.update -r MyRole $(govc role.ls Admin | grep VirtualMachine.GuestOperations.)
|
||||
govc role.update -a MyRole $(govc role.ls Admin | grep Datastore.)
|
||||
govc role.update -name RockNRole MyRole`
|
||||
}
|
||||
|
||||
func (cmd *update) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
if f.NArg() == 0 {
|
||||
return flag.ErrHelp
|
||||
}
|
||||
|
||||
m, err := cmd.Manager(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
role, err := cmd.Role(f.Arg(0))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
ids := role.Privilege
|
||||
args := f.Args()[1:]
|
||||
|
||||
if cmd.add {
|
||||
ids = append(ids, args...)
|
||||
} else if cmd.remove {
|
||||
ids = nil
|
||||
rm := make(map[string]bool, len(args))
|
||||
for _, arg := range args {
|
||||
rm[arg] = true
|
||||
}
|
||||
|
||||
for _, id := range role.Privilege {
|
||||
if !rm[id] {
|
||||
ids = append(ids, id)
|
||||
}
|
||||
}
|
||||
} else if len(args) != 0 {
|
||||
ids = args
|
||||
}
|
||||
|
||||
if cmd.name == "" {
|
||||
cmd.name = role.Name
|
||||
}
|
||||
|
||||
return m.UpdateRole(ctx, role.RoleId, cmd.name, ids)
|
||||
}
|
||||
87
vendor/github.com/vmware/govmomi/govc/role/usage.go
generated
vendored
Normal file
87
vendor/github.com/vmware/govmomi/govc/role/usage.go
generated
vendored
Normal file
@@ -0,0 +1,87 @@
|
||||
/*
|
||||
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package role
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/permissions"
|
||||
)
|
||||
|
||||
type usage struct {
|
||||
*permissions.PermissionFlag
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("role.usage", &usage{})
|
||||
}
|
||||
|
||||
func (cmd *usage) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.PermissionFlag, ctx = permissions.NewPermissionFlag(ctx)
|
||||
cmd.PermissionFlag.Register(ctx, f)
|
||||
}
|
||||
|
||||
func (cmd *usage) Process(ctx context.Context) error {
|
||||
if err := cmd.PermissionFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *usage) Usage() string {
|
||||
return "NAME..."
|
||||
}
|
||||
|
||||
func (cmd *usage) Description() string {
|
||||
return `List usage for role NAME.
|
||||
|
||||
Examples:
|
||||
govc role.usage
|
||||
govc role.usage Admin`
|
||||
}
|
||||
|
||||
func (cmd *usage) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
m, err := cmd.Manager(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if f.NArg() == 0 {
|
||||
cmd.List.Permissions, err = m.RetrieveAllPermissions(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
} else {
|
||||
for _, name := range f.Args() {
|
||||
role, err := cmd.Role(name)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
perms, err := m.RetrieveRolePermissions(ctx, role.RoleId)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
cmd.List.Add(perms)
|
||||
}
|
||||
}
|
||||
|
||||
return cmd.WriteResult(&cmd.List)
|
||||
}
|
||||
Reference in New Issue
Block a user