-
Notifications
You must be signed in to change notification settings - Fork 6
/
admin_user_eligibilities_client.go
149 lines (120 loc) · 4.99 KB
/
admin_user_eligibilities_client.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
// Copyright (c) 2021 AccelByte Inc. All Rights Reserved.
// This is licensed software from AccelByte Inc, for limitations
// and restrictions contact your company contract manager.
// Code generated ; DO NOT EDIT.
package admin_user_eligibilities
import (
"context"
"fmt"
"reflect"
"github.com/go-openapi/runtime"
"github.com/go-openapi/strfmt"
)
// New creates a new admin user eligibilities API client.
func New(transport runtime.ClientTransport, formats strfmt.Registry) ClientService {
return &Client{transport: transport, formats: formats}
}
/*
Client for admin user eligibilities API
*/
type Client struct {
transport runtime.ClientTransport
formats strfmt.Registry
}
// ClientService is the interface for Client methods
type ClientService interface {
AdminRetrieveEligibilities(params *AdminRetrieveEligibilitiesParams, authInfo runtime.ClientAuthInfoWriter) (*AdminRetrieveEligibilitiesOK, *AdminRetrieveEligibilitiesBadRequest, error)
AdminRetrieveEligibilitiesShort(params *AdminRetrieveEligibilitiesParams, authInfo runtime.ClientAuthInfoWriter) (*AdminRetrieveEligibilitiesOK, error)
SetTransport(transport runtime.ClientTransport)
}
/*
Deprecated: 2022-08-10 - Use AdminRetrieveEligibilitiesShort instead.
AdminRetrieveEligibilities check user legal eligibility
Retrieve the active policies and its conformance status by user.
This process only supports cross-namespace checking between game namespace and publisher namespace , that means if the active policy already accepted by the same user in publisher namespace, then it will also be considered as eligible in non-publisher namespace.
Other detail info:
* Required permission : resource="ADMIN:NAMESPACE:{namespace}:USER:{userId}:LEGAL", action=2 (READ)
*/
func (a *Client) AdminRetrieveEligibilities(params *AdminRetrieveEligibilitiesParams, authInfo runtime.ClientAuthInfoWriter) (*AdminRetrieveEligibilitiesOK, *AdminRetrieveEligibilitiesBadRequest, error) {
// TODO: Validate the params before sending
if params == nil {
params = NewAdminRetrieveEligibilitiesParams()
}
if params.Context == nil {
params.Context = context.Background()
}
if params.RetryPolicy != nil {
params.SetHTTPClientTransport(params.RetryPolicy)
}
result, err := a.transport.Submit(&runtime.ClientOperation{
ID: "adminRetrieveEligibilities",
Method: "GET",
PathPattern: "/agreement/admin/namespaces/{namespace}/users/{userId}/eligibilities",
ProducesMediaTypes: []string{"application/json"},
ConsumesMediaTypes: []string{"application/json"},
Schemes: []string{"https"},
Params: params,
Reader: &AdminRetrieveEligibilitiesReader{formats: a.formats},
AuthInfo: authInfo,
Context: params.Context,
Client: params.HTTPClient,
})
if err != nil {
return nil, nil, err
}
switch v := result.(type) {
case *AdminRetrieveEligibilitiesOK:
return v, nil, nil
case *AdminRetrieveEligibilitiesBadRequest:
return nil, v, nil
default:
return nil, nil, fmt.Errorf("Unexpected Type %v", reflect.TypeOf(v))
}
}
/*
AdminRetrieveEligibilitiesShort check user legal eligibility
Retrieve the active policies and its conformance status by user.
This process only supports cross-namespace checking between game namespace and publisher namespace , that means if the active policy already accepted by the same user in publisher namespace, then it will also be considered as eligible in non-publisher namespace.
Other detail info:
* Required permission : resource="ADMIN:NAMESPACE:{namespace}:USER:{userId}:LEGAL", action=2 (READ)
*/
func (a *Client) AdminRetrieveEligibilitiesShort(params *AdminRetrieveEligibilitiesParams, authInfo runtime.ClientAuthInfoWriter) (*AdminRetrieveEligibilitiesOK, error) {
// TODO: Validate the params before sending
if params == nil {
params = NewAdminRetrieveEligibilitiesParams()
}
if params.Context == nil {
params.Context = context.Background()
}
if params.RetryPolicy != nil {
params.SetHTTPClientTransport(params.RetryPolicy)
}
result, err := a.transport.Submit(&runtime.ClientOperation{
ID: "adminRetrieveEligibilities",
Method: "GET",
PathPattern: "/agreement/admin/namespaces/{namespace}/users/{userId}/eligibilities",
ProducesMediaTypes: []string{"application/json"},
ConsumesMediaTypes: []string{"application/json"},
Schemes: []string{"https"},
Params: params,
Reader: &AdminRetrieveEligibilitiesReader{formats: a.formats},
AuthInfo: authInfo,
Context: params.Context,
Client: params.HTTPClient,
})
if err != nil {
return nil, err
}
switch v := result.(type) {
case *AdminRetrieveEligibilitiesOK:
return v, nil
case *AdminRetrieveEligibilitiesBadRequest:
return nil, v
default:
return nil, fmt.Errorf("Unexpected Type %v", reflect.TypeOf(v))
}
}
// SetTransport changes the transport on the client
func (a *Client) SetTransport(transport runtime.ClientTransport) {
a.transport = transport
}