diff --git a/default_api.go b/default_api.go index a318c17..497ee3d 100644 --- a/default_api.go +++ b/default_api.go @@ -9633,7 +9633,7 @@ func (a *DefaultApiService) SetPermissionForGroups(localVarOptionals map[string] @param "permission" (string) The permission to grant. See the [permissions documentation](https://confluence.atlassian.com/display/BitbucketServer/Using+project+permissions) for a detailed explanation of what each permission entails. Available project permissions are: <ul> <li>PROJECT_READ</li> <li>PROJECT_WRITE</li> <li>PROJECT_ADMIN</li> </ul> @param "name" (string) the names of the groups @return */ -func (a *DefaultApiService) SetPermissionForGroups_32(localVarOptionals map[string]interface{}) (*APIResponse, error) { +func (a *DefaultApiService) SetPermissionForGroups_32(projectKey string, localVarOptionals map[string]interface{}) (*APIResponse, error) { var ( localVarHTTPMethod = strings.ToUpper("Put") localVarPostBody interface{} @@ -9643,6 +9643,7 @@ func (a *DefaultApiService) SetPermissionForGroups_32(localVarOptionals map[stri // create path and map variables localVarPath := a.client.cfg.BasePath + "/api/1.0/projects/{projectKey}/permissions/groups" + localVarPath = strings.Replace(localVarPath, "{"+"projectKey"+"}", fmt.Sprintf("%v", projectKey), -1) localVarHeaderParams := make(map[string]string) localVarQueryParams := url.Values{} @@ -9693,7 +9694,7 @@ func (a *DefaultApiService) SetPermissionForGroups_32(localVarOptionals map[stri return NewAPIResponseWithError(localVarHTTPResponse, reportError("Status: %v, Body: %s", localVarHTTPResponse.Status, bodyBytes)) } - return NewBitbucketAPIResponse(localVarHTTPResponse) + return NewAPIResponse(localVarHTTPResponse), nil } /* DefaultApiService @@ -9847,7 +9848,7 @@ func (a *DefaultApiService) SetPermissionForUsers(localVarOptionals map[string]i @param "name" (string) the names of the users @param "permission" (string) the permission to grant. See the [permissions documentation](https://confluence.atlassian.com/display/BitbucketServer/Using+project+permissions) for a detailed explanation of what each permission entails. Available project permissions are: <ul> <li>PROJECT_READ</li> <li>PROJECT_WRITE</li> <li>PROJECT_ADMIN</li> </ul> @return */ -func (a *DefaultApiService) SetPermissionForUsers_33(localVarOptionals map[string]interface{}) (*APIResponse, error) { +func (a *DefaultApiService) SetPermissionForUsers_33(projectKey string, localVarOptionals map[string]interface{}) (*APIResponse, error) { var ( localVarHTTPMethod = strings.ToUpper("Put") localVarPostBody interface{} @@ -9857,6 +9858,7 @@ func (a *DefaultApiService) SetPermissionForUsers_33(localVarOptionals map[strin // create path and map variables localVarPath := a.client.cfg.BasePath + "/api/1.0/projects/{projectKey}/permissions/users" + localVarPath = strings.Replace(localVarPath, "{"+"projectKey"+"}", fmt.Sprintf("%v", projectKey), -1) localVarHeaderParams := make(map[string]string) localVarQueryParams := url.Values{} @@ -9907,7 +9909,7 @@ func (a *DefaultApiService) SetPermissionForUsers_33(localVarOptionals map[strin return NewAPIResponseWithError(localVarHTTPResponse, reportError("Status: %v, Body: %s", localVarHTTPResponse.Status, bodyBytes)) } - return NewBitbucketAPIResponse(localVarHTTPResponse) + return NewAPIResponse(localVarHTTPResponse), nil } /* DefaultApiService diff --git a/default_api_test.go b/default_api_test.go index ed9c135..be44726 100644 --- a/default_api_test.go +++ b/default_api_test.go @@ -5234,6 +5234,7 @@ func TestDefaultApiService_SetPermissionForGroups_32(t *testing.T) { client *APIClient } type args struct { + projectKey string localVarOptionals map[string]interface{} } tests := []struct { @@ -5243,14 +5244,14 @@ func TestDefaultApiService_SetPermissionForGroups_32(t *testing.T) { want *APIResponse wantErr bool }{ - {"networkErrorContextExceeded", fields{client: generateConfigFake()}, args{}, &APIResponse{Message: "Put https://stash.domain.com/rest/api/1.0/projects/%7BprojectKey%7D/permissions/groups: context canceled"}, true}, + {"networkErrorContextExceeded", fields{client: generateConfigFake()}, args{}, &APIResponse{Message: "Put https://stash.domain.com/rest/api/1.0/projects//permissions/groups: context canceled"}, true}, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { a := &DefaultApiService{ client: tt.fields.client, } - got, err := a.SetPermissionForGroups_32(tt.args.localVarOptionals) + got, err := a.SetPermissionForGroups_32(tt.args.projectKey, tt.args.localVarOptionals) if (err != nil) != tt.wantErr { t.Errorf("DefaultApiService.SetPermissionForGroups_32() error = %v, wantErr %v", err, tt.wantErr) return @@ -5335,6 +5336,7 @@ func TestDefaultApiService_SetPermissionForUsers_33(t *testing.T) { client *APIClient } type args struct { + projectKey string localVarOptionals map[string]interface{} } tests := []struct { @@ -5344,14 +5346,14 @@ func TestDefaultApiService_SetPermissionForUsers_33(t *testing.T) { want *APIResponse wantErr bool }{ - {"networkErrorContextExceeded", fields{client: generateConfigFake()}, args{}, &APIResponse{Message: "Put https://stash.domain.com/rest/api/1.0/projects/%7BprojectKey%7D/permissions/users: context canceled"}, true}, + {"networkErrorContextExceeded", fields{client: generateConfigFake()}, args{}, &APIResponse{Message: "Put https://stash.domain.com/rest/api/1.0/projects//permissions/users: context canceled"}, true}, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { a := &DefaultApiService{ client: tt.fields.client, } - got, err := a.SetPermissionForUsers_33(tt.args.localVarOptionals) + got, err := a.SetPermissionForUsers_33(tt.args.projectKey, tt.args.localVarOptionals) if (err != nil) != tt.wantErr { t.Errorf("DefaultApiService.SetPermissionForUsers_33() error = %v, wantErr %v", err, tt.wantErr) return