9f752cd756
Signed-off-by: Denis Kirillov <denis@nspcc.ru>
142 lines
3.8 KiB
Go
142 lines
3.8 KiB
Go
// Code generated by go-swagger; DO NOT EDIT.
|
|
|
|
package operations
|
|
|
|
// This file was generated by the swagger tool.
|
|
// Editing this file might prove futile when you re-run the swagger generate command
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"net/http"
|
|
|
|
"github.com/go-openapi/errors"
|
|
"github.com/go-openapi/runtime"
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/go-openapi/strfmt"
|
|
"github.com/go-openapi/validate"
|
|
)
|
|
|
|
// NewPutContainerParams creates a new PutContainerParams object
|
|
//
|
|
// There are no default values defined in the spec.
|
|
func NewPutContainerParams() PutContainerParams {
|
|
|
|
return PutContainerParams{}
|
|
}
|
|
|
|
// PutContainerParams contains all the bound params for the put container operation
|
|
// typically these are obtained from a http.Request
|
|
//
|
|
// swagger:parameters putContainer
|
|
type PutContainerParams struct {
|
|
|
|
// HTTP Request Object
|
|
HTTPRequest *http.Request `json:"-"`
|
|
|
|
/*Base64 encoded signature for bearer token
|
|
Required: true
|
|
In: header
|
|
*/
|
|
XNeofsTokenSignature string
|
|
/*Hex encoded the public part of the key that signed the bearer token
|
|
Required: true
|
|
In: header
|
|
*/
|
|
XNeofsTokenSignatureKey string
|
|
/*Container info
|
|
Required: true
|
|
In: body
|
|
*/
|
|
Container PutContainerBody
|
|
}
|
|
|
|
// BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface
|
|
// for simple values it will use straight method calls.
|
|
//
|
|
// To ensure default values, the struct must have been initialized with NewPutContainerParams() beforehand.
|
|
func (o *PutContainerParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error {
|
|
var res []error
|
|
|
|
o.HTTPRequest = r
|
|
|
|
if err := o.bindXNeofsTokenSignature(r.Header[http.CanonicalHeaderKey("X-Neofs-Token-Signature")], true, route.Formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := o.bindXNeofsTokenSignatureKey(r.Header[http.CanonicalHeaderKey("X-Neofs-Token-signature-Key")], true, route.Formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if runtime.HasBody(r) {
|
|
defer r.Body.Close()
|
|
var body PutContainerBody
|
|
if err := route.Consumer.Consume(r.Body, &body); err != nil {
|
|
if err == io.EOF {
|
|
res = append(res, errors.Required("container", "body", ""))
|
|
} else {
|
|
res = append(res, errors.NewParseError("container", "body", "", err))
|
|
}
|
|
} else {
|
|
// validate body object
|
|
if err := body.Validate(route.Formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
ctx := validate.WithOperationRequest(context.Background())
|
|
if err := body.ContextValidate(ctx, route.Formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) == 0 {
|
|
o.Container = body
|
|
}
|
|
}
|
|
} else {
|
|
res = append(res, errors.Required("container", "body", ""))
|
|
}
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// bindXNeofsTokenSignature binds and validates parameter XNeofsTokenSignature from header.
|
|
func (o *PutContainerParams) bindXNeofsTokenSignature(rawData []string, hasKey bool, formats strfmt.Registry) error {
|
|
if !hasKey {
|
|
return errors.Required("X-Neofs-Token-Signature", "header", rawData)
|
|
}
|
|
var raw string
|
|
if len(rawData) > 0 {
|
|
raw = rawData[len(rawData)-1]
|
|
}
|
|
|
|
// Required: true
|
|
|
|
if err := validate.RequiredString("X-Neofs-Token-Signature", "header", raw); err != nil {
|
|
return err
|
|
}
|
|
o.XNeofsTokenSignature = raw
|
|
|
|
return nil
|
|
}
|
|
|
|
// bindXNeofsTokenSignatureKey binds and validates parameter XNeofsTokenSignatureKey from header.
|
|
func (o *PutContainerParams) bindXNeofsTokenSignatureKey(rawData []string, hasKey bool, formats strfmt.Registry) error {
|
|
if !hasKey {
|
|
return errors.Required("X-Neofs-Token-signature-Key", "header", rawData)
|
|
}
|
|
var raw string
|
|
if len(rawData) > 0 {
|
|
raw = rawData[len(rawData)-1]
|
|
}
|
|
|
|
// Required: true
|
|
|
|
if err := validate.RequiredString("X-Neofs-Token-signature-Key", "header", raw); err != nil {
|
|
return err
|
|
}
|
|
o.XNeofsTokenSignatureKey = raw
|
|
|
|
return nil
|
|
}
|