-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathapi_security_overrides.go
155 lines (128 loc) · 5.06 KB
/
api_security_overrides.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
/*
Sonatype Lifecycle Public REST API
No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
API version: 1.184.0-01
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package sonatypeiq
import (
"bytes"
"context"
"io"
"net/http"
"net/url"
)
// SecurityOverridesAPIService SecurityOverridesAPI service
type SecurityOverridesAPIService service
type ApiGetSecurityVulnerabilityOverridesRequest struct {
ctx context.Context
ApiService *SecurityOverridesAPIService
refId *string
componentPurl *string
ownerId *string
}
func (r ApiGetSecurityVulnerabilityOverridesRequest) RefId(refId string) ApiGetSecurityVulnerabilityOverridesRequest {
r.refId = &refId
return r
}
func (r ApiGetSecurityVulnerabilityOverridesRequest) ComponentPurl(componentPurl string) ApiGetSecurityVulnerabilityOverridesRequest {
r.componentPurl = &componentPurl
return r
}
func (r ApiGetSecurityVulnerabilityOverridesRequest) OwnerId(ownerId string) ApiGetSecurityVulnerabilityOverridesRequest {
r.ownerId = &ownerId
return r
}
func (r ApiGetSecurityVulnerabilityOverridesRequest) Execute() (*ApiSecurityVulnerabilityOverrideResponseDTOV2, *http.Response, error) {
return r.ApiService.GetSecurityVulnerabilityOverridesExecute(r)
}
/*
GetSecurityVulnerabilityOverrides Method for GetSecurityVulnerabilityOverrides
@param ctx context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background().
@return ApiGetSecurityVulnerabilityOverridesRequest
*/
func (a *SecurityOverridesAPIService) GetSecurityVulnerabilityOverrides(ctx context.Context) ApiGetSecurityVulnerabilityOverridesRequest {
return ApiGetSecurityVulnerabilityOverridesRequest{
ApiService: a,
ctx: ctx,
}
}
// Execute executes the request
// @return ApiSecurityVulnerabilityOverrideResponseDTOV2
func (a *SecurityOverridesAPIService) GetSecurityVulnerabilityOverridesExecute(r ApiGetSecurityVulnerabilityOverridesRequest) (*ApiSecurityVulnerabilityOverrideResponseDTOV2, *http.Response, error) {
var (
localVarHTTPMethod = http.MethodGet
localVarPostBody interface{}
formFiles []formFile
localVarReturnValue *ApiSecurityVulnerabilityOverrideResponseDTOV2
)
localBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, "SecurityOverridesAPIService.GetSecurityVulnerabilityOverrides")
if err != nil {
return localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}
}
localVarPath := localBasePath + "/api/v2/securityOverrides"
localVarHeaderParams := make(map[string]string)
localVarQueryParams := url.Values{}
localVarFormParams := url.Values{}
if r.refId != nil {
parameterAddToHeaderOrQuery(localVarQueryParams, "refId", r.refId, "form", "")
}
if r.componentPurl != nil {
parameterAddToHeaderOrQuery(localVarQueryParams, "componentPurl", r.componentPurl, "form", "")
}
if r.ownerId != nil {
parameterAddToHeaderOrQuery(localVarQueryParams, "ownerId", r.ownerId, "form", "")
}
// to determine the Content-Type header
localVarHTTPContentTypes := []string{}
// set Content-Type header
localVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)
if localVarHTTPContentType != "" {
localVarHeaderParams["Content-Type"] = localVarHTTPContentType
}
// to determine the Accept header
localVarHTTPHeaderAccepts := []string{"application/json"}
// set Accept header
localVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)
if localVarHTTPHeaderAccept != "" {
localVarHeaderParams["Accept"] = localVarHTTPHeaderAccept
}
req, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)
if err != nil {
return localVarReturnValue, nil, err
}
localVarHTTPResponse, err := a.client.callAPI(req)
if err != nil || localVarHTTPResponse == nil {
return localVarReturnValue, localVarHTTPResponse, err
}
localVarBody, err := io.ReadAll(localVarHTTPResponse.Body)
localVarHTTPResponse.Body.Close()
localVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))
if err != nil {
return localVarReturnValue, localVarHTTPResponse, err
}
if localVarHTTPResponse.StatusCode >= 300 {
newErr := &GenericOpenAPIError{
body: localVarBody,
error: localVarHTTPResponse.Status,
}
var v ApiSecurityVulnerabilityOverrideResponseDTOV2
err = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get("Content-Type"))
if err != nil {
newErr.error = err.Error()
return localVarReturnValue, localVarHTTPResponse, newErr
}
newErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)
newErr.model = v
return localVarReturnValue, localVarHTTPResponse, newErr
}
err = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get("Content-Type"))
if err != nil {
newErr := &GenericOpenAPIError{
body: localVarBody,
error: err.Error(),
}
return localVarReturnValue, localVarHTTPResponse, newErr
}
return localVarReturnValue, localVarHTTPResponse, nil
}