Authentication-Results: mail-b.sr.ht; dkim=pass header.d=protonmail.com header.i=@protonmail.com Received: from mail-4316.protonmail.ch (mail-4316.protonmail.ch [185.70.43.16]) by mail-b.sr.ht (Postfix) with ESMTPS id 02D5D11EF1E for <~emersion/hut-dev@lists.sr.ht>; Sun, 23 Jan 2022 09:20:44 +0000 (UTC) Date: Sun, 23 Jan 2022 09:20:38 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail2; t=1642929643; bh=rMmj01yf3nr7LJ1hfGyRxRBXml1fguNckWmDBg5G6gI=; h=Date:To:From:Cc:Reply-To:Subject:Message-ID:In-Reply-To: References:From:To:Cc; b=vPKIhxM9E4Due9/IA820RpGpB7Si8FZVI7K986ZzBarOo0+fi1iAKdBIZp7G+T1e4 Rtul3CkN5saLO87BAb/lG1I9UEixuRndejuA5s2N0ZQT9pJIBD2Waz+unaJDDJBXIx LSZzyzHrVF7mZ3H3w5iqw+Qhole5ZuJi0DAf5ubptk/u29W68alCoS4+dH1nQbei7e EHUPYkYe4gYt1C4z/cgk1oYTqG+MUTejYWL7epJZ8eOz8kI/gmZUg8GyH0J2ilU5Ul HHLeqfYc/h8/2YNfWMU1g+9mYhfyxIoetW0TuZGE39Yd1dAfCioi/KW63o6NDExwkU FXYU7wkFFFmtw== To: Simon Ser From: Renato Torres Cc: ~emersion/hut-dev@lists.sr.ht Reply-To: Renato Torres Subject: Re: [PATCH v1 0/1] git: show license spike Message-ID: In-Reply-To: References: <20220122233022.1256016-1-renato.torres@protonmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.2 required=10.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM shortcircuit=no autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mailout.protonmail.ch > Any other ideas? The client can have an ExecuteRaw method to return json.RawMessage,=20 giving developers the possibility to decode the JSON in scenarios with complicated nested interfaces: func (c *Client) ExecuteRaw(ctx context.Context, op *Operation) (*json.RawMessage, error) { // ... } The generate code in gql.go could be augmented with functions like: func RepositoryByNameRaw(client *gqlclient.Client,=20 ctx context.Context, name string) (message **json.RawMessage, err error= ) { // ... } This is not as friendly as having well defined structures but unlocks the possibility to tackle cases we cannot forsee or quickly add support to. What do you think?