In fact thinking about this a bit more, it could be worth having
‘[`Readonly] conn’ and ‘[`Readonly|`Secure] conn’ phantom types. Then
you would have two variants dumpxml and dumpxml_secure depending on
whether secure data was required in the output. Existing callers
would need to be checked to see if they really need the secure data
(at the moment it seems they get it whether they need it or not).
Rich.
--
Richard Jones, Virtualization Group, Red Hat
http://people.redhat.com/~rjones
Read my programming and virtualization blog:
http://rwmj.wordpress.com
virt-top is 'top' for virtual machines. Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top