-
Notifications
You must be signed in to change notification settings - Fork 37
/
model_datastorecredentials.go
101 lines (85 loc) · 2.84 KB
/
model_datastorecredentials.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
package datastore
import (
"encoding/json"
"fmt"
"strings"
)
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License. See NOTICE.txt in the project root for license information.
type DatastoreCredentials interface {
}
// RawDatastoreCredentialsImpl is returned when the Discriminated Value
// doesn't match any of the defined types
// NOTE: this should only be used when a type isn't defined for this type of Object (as a workaround)
// and is used only for Deserialization (e.g. this cannot be used as a Request Payload).
type RawDatastoreCredentialsImpl struct {
Type string
Values map[string]interface{}
}
func unmarshalDatastoreCredentialsImplementation(input []byte) (DatastoreCredentials, error) {
if input == nil {
return nil, nil
}
var temp map[string]interface{}
if err := json.Unmarshal(input, &temp); err != nil {
return nil, fmt.Errorf("unmarshaling DatastoreCredentials into map[string]interface: %+v", err)
}
value, ok := temp["credentialsType"].(string)
if !ok {
return nil, nil
}
if strings.EqualFold(value, "AccountKey") {
var out AccountKeyDatastoreCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into AccountKeyDatastoreCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "Certificate") {
var out CertificateDatastoreCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into CertificateDatastoreCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "KerberosKeytab") {
var out KerberosKeytabCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into KerberosKeytabCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "KerberosPassword") {
var out KerberosPasswordCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into KerberosPasswordCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "None") {
var out NoneDatastoreCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into NoneDatastoreCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "Sas") {
var out SasDatastoreCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into SasDatastoreCredentials: %+v", err)
}
return out, nil
}
if strings.EqualFold(value, "ServicePrincipal") {
var out ServicePrincipalDatastoreCredentials
if err := json.Unmarshal(input, &out); err != nil {
return nil, fmt.Errorf("unmarshaling into ServicePrincipalDatastoreCredentials: %+v", err)
}
return out, nil
}
out := RawDatastoreCredentialsImpl{
Type: value,
Values: temp,
}
return out, nil
}