In fact thinking about this a bit more, it could be worth having ‘[`Readonly] conn’ and ‘[`Readonly|`Secure] conn’ phantom types. Then you would have two variants dumpxml and dumpxml_secure depending on whether secure data was required in the output. Existing callers would need to be checked to see if they really need the secure data (at the moment it seems they get it whether they need it or not).
Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Read my programming and virtualization blog: http://rwmj.wordpress.com virt-top is 'top' for virtual machines. Tiny program with many powerful monitoring features, net stats, disk stats, logging, etc. http://people.redhat.com/~rjones/virt-top _______________________________________________ Libguestfs mailing list [email protected] https://www.redhat.com/mailman/listinfo/libguestfs
