NONRTRIC-946: Fix panics in Capif
[nonrtric/plt/sme.git] / capifcore / internal / accesscontrolpolicyapi / accesscontrolpolicyapi.gen.go
1 // Package accesscontrolpolicyapi provides primitives to interact with the openapi HTTP API.
2 //
3 // Code generated by github.com/deepmap/oapi-codegen version v1.10.1 DO NOT EDIT.
4 package accesscontrolpolicyapi
5
6 import (
7         "bytes"
8         "compress/gzip"
9         "encoding/base64"
10         "fmt"
11         "net/http"
12         "net/url"
13         "path"
14         "strings"
15
16         "github.com/deepmap/oapi-codegen/pkg/runtime"
17         "github.com/getkin/kin-openapi/openapi3"
18         "github.com/labstack/echo/v4"
19         externalRef0 "oransc.org/nonrtric/capifcore/internal/common29571"
20 )
21
22 // ServerInterface represents all server handlers.
23 type ServerInterface interface {
24
25         // (GET /accessControlPolicyList/{serviceApiId})
26         GetAccessControlPolicyListServiceApiId(ctx echo.Context, serviceApiId string, params GetAccessControlPolicyListServiceApiIdParams) error
27 }
28
29 // ServerInterfaceWrapper converts echo contexts to parameters.
30 type ServerInterfaceWrapper struct {
31         Handler ServerInterface
32 }
33
34 // GetAccessControlPolicyListServiceApiId converts echo context to params.
35 func (w *ServerInterfaceWrapper) GetAccessControlPolicyListServiceApiId(ctx echo.Context) error {
36         var err error
37         // ------------- Path parameter "serviceApiId" -------------
38         var serviceApiId string
39
40         err = runtime.BindStyledParameterWithLocation("simple", false, "serviceApiId", runtime.ParamLocationPath, ctx.Param("serviceApiId"), &serviceApiId)
41         if err != nil {
42                 return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Invalid format for parameter serviceApiId: %s", err))
43         }
44
45         // Parameter object where we will unmarshal all parameters from the context
46         var params GetAccessControlPolicyListServiceApiIdParams
47         // ------------- Required query parameter "aef-id" -------------
48
49         err = runtime.BindQueryParameter("form", true, true, "aef-id", ctx.QueryParams(), &params.AefId)
50         if err != nil {
51                 return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Invalid format for parameter aef-id: %s", err))
52         }
53
54         // ------------- Optional query parameter "api-invoker-id" -------------
55
56         err = runtime.BindQueryParameter("form", true, false, "api-invoker-id", ctx.QueryParams(), &params.ApiInvokerId)
57         if err != nil {
58                 return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Invalid format for parameter api-invoker-id: %s", err))
59         }
60
61         // ------------- Optional query parameter "supported-features" -------------
62
63         err = runtime.BindQueryParameter("form", true, false, "supported-features", ctx.QueryParams(), &params.SupportedFeatures)
64         if err != nil {
65                 return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Invalid format for parameter supported-features: %s", err))
66         }
67
68         // Invoke the callback with all the unmarshalled arguments
69         err = w.Handler.GetAccessControlPolicyListServiceApiId(ctx, serviceApiId, params)
70         return err
71 }
72
73 // This is a simple interface which specifies echo.Route addition functions which
74 // are present on both echo.Echo and echo.Group, since we want to allow using
75 // either of them for path registration
76 type EchoRouter interface {
77         CONNECT(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
78         DELETE(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
79         GET(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
80         HEAD(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
81         OPTIONS(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
82         PATCH(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
83         POST(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
84         PUT(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
85         TRACE(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route
86 }
87
88 // RegisterHandlers adds each server route to the EchoRouter.
89 func RegisterHandlers(router EchoRouter, si ServerInterface) {
90         RegisterHandlersWithBaseURL(router, si, "")
91 }
92
93 // Registers handlers, and prepends BaseURL to the paths, so that the paths
94 // can be served under a prefix.
95 func RegisterHandlersWithBaseURL(router EchoRouter, si ServerInterface, baseURL string) {
96
97         wrapper := ServerInterfaceWrapper{
98                 Handler: si,
99         }
100
101         router.GET(baseURL+"/accessControlPolicyList/:serviceApiId", wrapper.GetAccessControlPolicyListServiceApiId)
102
103 }
104
105 // Base64 encoded, gzipped, json marshaled Swagger object
106 var swaggerSpec = []string{
107
108         "H4sIAAAAAAAC/6xX3W7bOBN9lQG/72IXUCRbqZvGd16nKYxdbI3Y2Ju2MGhpZLGVSJak7HoDP9C+xj7Z",
109         "YkjFP7XdP/cmTuSZM2eGh2eUR5apWiuJ0lnWf2Q2K7Hm/tdBlqG1QyWdUdVYVSJb/yGso69ytJkR2gkl",
110         "WZ89oDZoCQFcicB9HmQhEbTPhEpYB4UywEE380rYEnOwaJYiQxiMRzGLmDZKo3ECfX2uxUgu1Qc0vnj7",
111         "9LB0oAWqAORZSTggQg7hCYe1T/q/wYL12f+SXbNJ22kyOCyzZpuIubVG1mfcGL5mm90DNX+PmaOIo6yv",
112         "TUVvmXLpeY52PD/ru6rUCnP6PuMENhU1PnC5wNPjn5YITtQIhmIs5I0RcgGrUmSlLy22SBa4QWgLgJL+",
113         "671DgPnaP9qf41v5rZM85Hk0xui4MztGM8FMyfy4rb0o0GjA+rjvJM+2JIR0uECzR2OqHK/2qpyYLEWA",
114         "bOo5Gjq5g0H+BB5bDY1O9L+XDqM74NaKhcT8CX04GI/uIVMGoWhk5pO2RawjCXjlGvzYCIM56785LPju",
115         "hKq/orTPJL0T3Zc05yV/MB+xm945vR3eCOu4ccRtT4HTSXrbTdPZUNW1knfc8XjN6+qkMO+4Q5++iZh1",
116         "Sv8UqGNXoEf4yaGRvLpT2QlBXb8aj2E6gfQ2TtMU/urexL24A6Gwn8K94TWulPngvdLH/6mMK+eqkTlF",
117         "WBaxxlSsz0rntO0nyWq1iq8XWsfKLJLC6WSiMbMJN1kplpiktzOLRqBNQtWEpiBkoU5Lzlv0KQePAd7K",
118         "f/+BtJOmUWD22iy4FH/7Y+YVjLlxEo2FXwYPo98iGExHkwiGw8kggpfTySiC6eTOf0wH9GP4q8ccVBUY",
119         "sSidBVKXWWIeROCEq2i+XuqzsI5m7T6aBdudDcYjFrElGhta6MZp3KEOlUbJtaChx524Q5rirvRnkvDT",
120         "my15bFVK5p5vKHSBJ6+BMwKX+LV1R7eeZOznQ1ecvUJ3ZqtO9ip7rqQDh8ay/psjZ8xROlGIYEpn9imZ",
121         "NgVT1yxiktfeGA7L7MzBmQajdvtTx0dG8mUS/hK/vH8q+rFBs95V5VhciZ9fb2ca5+pqcdVGhPrfUW+q",
122         "oBCVQwPCGKxwyaUjfWolLZJSK+4wB6egkbbRWhn6s0DuGoP2DKFt4NVe4I7Unh/1brrf5EeTJ8T7J8DN",
123         "5h0NuiVKsGmnQx+kUJQuvFrpSgR7Tt5b6vfxmMbpt6UzL4Xe/A4n+Pr3mC7idefmO712Sz6hXA/x4gKI",
124         "FwTxLMzghyAo10N0L4DoBojrCyCuA8SzCyCeBYjnF0A89xDdC1h0A4v09sch0luC6F1wqL1wqL0LTqQX",
125         "TiTHgjeV+2GYp/zNxl8ivwFb3w+L/pFr8aCU27SL66rdNVdh1yTLLq1AbgSfV9t/nSghrK6W3fZ9AT/x",
126         "WlcYZ6pmn9/ZNhG4hRwLQe+bQkJW8cYi3MQ98t7Dlxii/W7zXwAAAP//Y6DD0EcOAAA=",
127 }
128
129 // GetSwagger returns the content of the embedded swagger specification file
130 // or error if failed to decode
131 func decodeSpec() ([]byte, error) {
132         zipped, err := base64.StdEncoding.DecodeString(strings.Join(swaggerSpec, ""))
133         if err != nil {
134                 return nil, fmt.Errorf("error base64 decoding spec: %s", err)
135         }
136         zr, err := gzip.NewReader(bytes.NewReader(zipped))
137         if err != nil {
138                 return nil, fmt.Errorf("error decompressing spec: %s", err)
139         }
140         var buf bytes.Buffer
141         _, err = buf.ReadFrom(zr)
142         if err != nil {
143                 return nil, fmt.Errorf("error decompressing spec: %s", err)
144         }
145
146         return buf.Bytes(), nil
147 }
148
149 var rawSpec = decodeSpecCached()
150
151 // a naive cached of a decoded swagger spec
152 func decodeSpecCached() func() ([]byte, error) {
153         data, err := decodeSpec()
154         return func() ([]byte, error) {
155                 return data, err
156         }
157 }
158
159 // Constructs a synthetic filesystem for resolving external references when loading openapi specifications.
160 func PathToRawSpec(pathToFile string) map[string]func() ([]byte, error) {
161         var res = make(map[string]func() ([]byte, error))
162         if len(pathToFile) > 0 {
163                 res[pathToFile] = rawSpec
164         }
165
166         pathPrefix := path.Dir(pathToFile)
167
168         for rawPath, rawFunc := range externalRef0.PathToRawSpec(path.Join(pathPrefix, "TS29571_CommonData.yaml")) {
169                 if _, ok := res[rawPath]; ok {
170                         // it is not possible to compare functions in golang, so always overwrite the old value
171                 }
172                 res[rawPath] = rawFunc
173         }
174         return res
175 }
176
177 // GetSwagger returns the Swagger specification corresponding to the generated code
178 // in this file. The external references of Swagger specification are resolved.
179 // The logic of resolving external references is tightly connected to "import-mapping" feature.
180 // Externally referenced files must be embedded in the corresponding golang packages.
181 // Urls can be supported but this task was out of the scope.
182 func GetSwagger() (swagger *openapi3.T, err error) {
183         var resolvePath = PathToRawSpec("")
184
185         loader := openapi3.NewLoader()
186         loader.IsExternalRefsAllowed = true
187         loader.ReadFromURIFunc = func(loader *openapi3.Loader, url *url.URL) ([]byte, error) {
188                 var pathToFile = url.String()
189                 pathToFile = path.Clean(pathToFile)
190                 getSpec, ok := resolvePath[pathToFile]
191                 if !ok {
192                         err1 := fmt.Errorf("path not found: %s", pathToFile)
193                         return nil, err1
194                 }
195                 return getSpec()
196         }
197         var specData []byte
198         specData, err = rawSpec()
199         if err != nil {
200                 return
201         }
202         swagger, err = loader.LoadFromData(specData)
203         if err != nil {
204                 return
205         }
206         return
207 }