| // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. |
| // source: etcdserver/etcdserverpb/rpc.proto |
| |
| /* |
| Package etcdserverpb is a reverse proxy. |
| |
| It translates gRPC into RESTful JSON APIs. |
| */ |
| package gw |
| |
| import ( |
| "go.etcd.io/etcd/etcdserver/etcdserverpb" |
| "io" |
| "net/http" |
| |
| "github.com/golang/protobuf/proto" |
| "github.com/grpc-ecosystem/grpc-gateway/runtime" |
| "github.com/grpc-ecosystem/grpc-gateway/utilities" |
| "golang.org/x/net/context" |
| "google.golang.org/grpc" |
| "google.golang.org/grpc/codes" |
| "google.golang.org/grpc/grpclog" |
| "google.golang.org/grpc/status" |
| ) |
| |
| var _ codes.Code |
| var _ io.Reader |
| var _ status.Status |
| var _ = runtime.String |
| var _ = utilities.NewDoubleArray |
| |
| func request_KV_Range_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.RangeRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Range(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_KV_Put_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.PutRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Put(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_KV_DeleteRange_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.DeleteRangeRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.DeleteRange(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_KV_Txn_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.TxnRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Txn(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_KV_Compact_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.CompactionRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Compact(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.WatchClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Watch_WatchClient, runtime.ServerMetadata, error) { |
| var metadata runtime.ServerMetadata |
| stream, err := client.Watch(ctx) |
| if err != nil { |
| grpclog.Printf("Failed to start streaming: %v", err) |
| return nil, metadata, err |
| } |
| dec := marshaler.NewDecoder(req.Body) |
| handleSend := func() error { |
| var protoReq etcdserverpb.WatchRequest |
| err := dec.Decode(&protoReq) |
| if err == io.EOF { |
| return err |
| } |
| if err != nil { |
| grpclog.Printf("Failed to decode request: %v", err) |
| return err |
| } |
| if err := stream.Send(&protoReq); err != nil { |
| grpclog.Printf("Failed to send request: %v", err) |
| return err |
| } |
| return nil |
| } |
| if err := handleSend(); err != nil { |
| if cerr := stream.CloseSend(); cerr != nil { |
| grpclog.Printf("Failed to terminate client stream: %v", cerr) |
| } |
| if err == io.EOF { |
| return stream, metadata, nil |
| } |
| return nil, metadata, err |
| } |
| go func() { |
| for { |
| if err := handleSend(); err != nil { |
| break |
| } |
| } |
| if err := stream.CloseSend(); err != nil { |
| grpclog.Printf("Failed to terminate client stream: %v", err) |
| } |
| }() |
| header, err := stream.Header() |
| if err != nil { |
| grpclog.Printf("Failed to get header from client: %v", err) |
| return nil, metadata, err |
| } |
| metadata.HeaderMD = header |
| return stream, metadata, nil |
| } |
| |
| func request_Lease_LeaseGrant_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseGrantRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseRevoke_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseRevokeRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseRevoke_1(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseRevokeRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseKeepAlive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Lease_LeaseKeepAliveClient, runtime.ServerMetadata, error) { |
| var metadata runtime.ServerMetadata |
| stream, err := client.LeaseKeepAlive(ctx) |
| if err != nil { |
| grpclog.Printf("Failed to start streaming: %v", err) |
| return nil, metadata, err |
| } |
| dec := marshaler.NewDecoder(req.Body) |
| handleSend := func() error { |
| var protoReq etcdserverpb.LeaseKeepAliveRequest |
| err := dec.Decode(&protoReq) |
| if err == io.EOF { |
| return err |
| } |
| if err != nil { |
| grpclog.Printf("Failed to decode request: %v", err) |
| return err |
| } |
| if err := stream.Send(&protoReq); err != nil { |
| grpclog.Printf("Failed to send request: %v", err) |
| return err |
| } |
| return nil |
| } |
| if err := handleSend(); err != nil { |
| if cerr := stream.CloseSend(); cerr != nil { |
| grpclog.Printf("Failed to terminate client stream: %v", cerr) |
| } |
| if err == io.EOF { |
| return stream, metadata, nil |
| } |
| return nil, metadata, err |
| } |
| go func() { |
| for { |
| if err := handleSend(); err != nil { |
| break |
| } |
| } |
| if err := stream.CloseSend(); err != nil { |
| grpclog.Printf("Failed to terminate client stream: %v", err) |
| } |
| }() |
| header, err := stream.Header() |
| if err != nil { |
| grpclog.Printf("Failed to get header from client: %v", err) |
| return nil, metadata, err |
| } |
| metadata.HeaderMD = header |
| return stream, metadata, nil |
| } |
| |
| func request_Lease_LeaseTimeToLive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseTimeToLiveRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseTimeToLive(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseTimeToLive_1(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseTimeToLiveRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseTimeToLive(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseLeases_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseLeasesRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseLeases(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Lease_LeaseLeases_1(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.LeaseLeasesRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.LeaseLeases(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Cluster_MemberAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MemberAddRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MemberAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Cluster_MemberRemove_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MemberRemoveRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MemberRemove(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Cluster_MemberUpdate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MemberUpdateRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MemberUpdate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Cluster_MemberList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MemberListRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MemberList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Cluster_MemberPromote_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MemberPromoteRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MemberPromote(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_Alarm_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AlarmRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Alarm(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_Status_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.StatusRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_Defragment_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.DefragmentRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Defragment(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_Hash_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.HashRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Hash(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_HashKV_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.HashKVRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.HashKV(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Maintenance_Snapshot_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Maintenance_SnapshotClient, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.SnapshotRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| stream, err := client.Snapshot(ctx, &protoReq) |
| if err != nil { |
| return nil, metadata, err |
| } |
| header, err := stream.Header() |
| if err != nil { |
| return nil, metadata, err |
| } |
| metadata.HeaderMD = header |
| return stream, metadata, nil |
| |
| } |
| |
| func request_Maintenance_MoveLeader_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.MoveLeaderRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.MoveLeader(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_AuthEnable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthEnableRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.AuthEnable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_AuthDisable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthDisableRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.AuthDisable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthenticateRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserAddRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserGetRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserListRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserDeleteRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserChangePasswordRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserGrantRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserGrantRoleRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserGrantRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_UserRevokeRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthUserRevokeRoleRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.UserRevokeRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleAddRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleGetRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleListRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleDeleteRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleGrantPermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleGrantPermissionRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleGrantPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| func request_Auth_RoleRevokePermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { |
| var protoReq etcdserverpb.AuthRoleRevokePermissionRequest |
| var metadata runtime.ServerMetadata |
| |
| if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF { |
| return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) |
| } |
| |
| msg, err := client.RoleRevokePermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) |
| return msg, metadata, err |
| |
| } |
| |
| // RegisterKVHandlerFromEndpoint is same as RegisterKVHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterKVHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterKVHandler(ctx, mux, conn) |
| } |
| |
| // RegisterKVHandler registers the http handlers for service KV to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterKVHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterKVHandlerClient(ctx, mux, etcdserverpb.NewKVClient(conn)) |
| } |
| |
| // RegisterKVHandler registers the http handlers for service KV to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "KVClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "KVClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "KVClient" to call the correct interceptors. |
| func RegisterKVHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.KVClient) error { |
| |
| mux.Handle("POST", pattern_KV_Range_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_KV_Range_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_KV_Range_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_KV_Put_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_KV_Put_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_KV_Put_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_KV_DeleteRange_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_KV_DeleteRange_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_KV_DeleteRange_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_KV_Txn_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_KV_Txn_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_KV_Txn_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_KV_Compact_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_KV_Compact_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_KV_Compact_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_KV_Range_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "kv", "range"}, "")) |
| |
| pattern_KV_Put_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "kv", "put"}, "")) |
| |
| pattern_KV_DeleteRange_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "kv", "deleterange"}, "")) |
| |
| pattern_KV_Txn_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "kv", "txn"}, "")) |
| |
| pattern_KV_Compact_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "kv", "compaction"}, "")) |
| ) |
| |
| var ( |
| forward_KV_Range_0 = runtime.ForwardResponseMessage |
| |
| forward_KV_Put_0 = runtime.ForwardResponseMessage |
| |
| forward_KV_DeleteRange_0 = runtime.ForwardResponseMessage |
| |
| forward_KV_Txn_0 = runtime.ForwardResponseMessage |
| |
| forward_KV_Compact_0 = runtime.ForwardResponseMessage |
| ) |
| |
| // RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterWatchHandler(ctx, mux, conn) |
| } |
| |
| // RegisterWatchHandler registers the http handlers for service Watch to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterWatchHandlerClient(ctx, mux, etcdserverpb.NewWatchClient(conn)) |
| } |
| |
| // RegisterWatchHandler registers the http handlers for service Watch to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "WatchClient" to call the correct interceptors. |
| func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.WatchClient) error { |
| |
| mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Watch_Watch_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Watch_Watch_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v3", "watch"}, "")) |
| ) |
| |
| var ( |
| forward_Watch_Watch_0 = runtime.ForwardResponseStream |
| ) |
| |
| // RegisterLeaseHandlerFromEndpoint is same as RegisterLeaseHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterLeaseHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterLeaseHandler(ctx, mux, conn) |
| } |
| |
| // RegisterLeaseHandler registers the http handlers for service Lease to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterLeaseHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterLeaseHandlerClient(ctx, mux, etcdserverpb.NewLeaseClient(conn)) |
| } |
| |
| // RegisterLeaseHandler registers the http handlers for service Lease to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "LeaseClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "LeaseClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "LeaseClient" to call the correct interceptors. |
| func RegisterLeaseHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.LeaseClient) error { |
| |
| mux.Handle("POST", pattern_Lease_LeaseGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseGrant_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseRevoke_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseRevoke_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseRevoke_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseRevoke_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseRevoke_1(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseRevoke_1(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseKeepAlive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseKeepAlive_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseKeepAlive_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseTimeToLive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseTimeToLive_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseTimeToLive_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseTimeToLive_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseTimeToLive_1(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseTimeToLive_1(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseLeases_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseLeases_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseLeases_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Lease_LeaseLeases_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Lease_LeaseLeases_1(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Lease_LeaseLeases_1(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_Lease_LeaseGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lease", "grant"}, "")) |
| |
| pattern_Lease_LeaseRevoke_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lease", "revoke"}, "")) |
| |
| pattern_Lease_LeaseRevoke_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "kv", "lease", "revoke"}, "")) |
| |
| pattern_Lease_LeaseKeepAlive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lease", "keepalive"}, "")) |
| |
| pattern_Lease_LeaseTimeToLive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lease", "timetolive"}, "")) |
| |
| pattern_Lease_LeaseTimeToLive_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "kv", "lease", "timetolive"}, "")) |
| |
| pattern_Lease_LeaseLeases_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lease", "leases"}, "")) |
| |
| pattern_Lease_LeaseLeases_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "kv", "lease", "leases"}, "")) |
| ) |
| |
| var ( |
| forward_Lease_LeaseGrant_0 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseRevoke_0 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseRevoke_1 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseKeepAlive_0 = runtime.ForwardResponseStream |
| |
| forward_Lease_LeaseTimeToLive_0 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseTimeToLive_1 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseLeases_0 = runtime.ForwardResponseMessage |
| |
| forward_Lease_LeaseLeases_1 = runtime.ForwardResponseMessage |
| ) |
| |
| // RegisterClusterHandlerFromEndpoint is same as RegisterClusterHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterClusterHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterClusterHandler(ctx, mux, conn) |
| } |
| |
| // RegisterClusterHandler registers the http handlers for service Cluster to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterClusterHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterClusterHandlerClient(ctx, mux, etcdserverpb.NewClusterClient(conn)) |
| } |
| |
| // RegisterClusterHandler registers the http handlers for service Cluster to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "ClusterClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ClusterClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "ClusterClient" to call the correct interceptors. |
| func RegisterClusterHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.ClusterClient) error { |
| |
| mux.Handle("POST", pattern_Cluster_MemberAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Cluster_MemberAdd_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Cluster_MemberAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Cluster_MemberRemove_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Cluster_MemberRemove_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Cluster_MemberRemove_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Cluster_MemberUpdate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Cluster_MemberUpdate_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Cluster_MemberUpdate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Cluster_MemberList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Cluster_MemberList_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Cluster_MemberList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Cluster_MemberPromote_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Cluster_MemberPromote_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Cluster_MemberPromote_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_Cluster_MemberAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "cluster", "member", "add"}, "")) |
| |
| pattern_Cluster_MemberRemove_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "cluster", "member", "remove"}, "")) |
| |
| pattern_Cluster_MemberUpdate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "cluster", "member", "update"}, "")) |
| |
| pattern_Cluster_MemberList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "cluster", "member", "list"}, "")) |
| |
| pattern_Cluster_MemberPromote_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "cluster", "member", "promote"}, "")) |
| ) |
| |
| var ( |
| forward_Cluster_MemberAdd_0 = runtime.ForwardResponseMessage |
| |
| forward_Cluster_MemberRemove_0 = runtime.ForwardResponseMessage |
| |
| forward_Cluster_MemberUpdate_0 = runtime.ForwardResponseMessage |
| |
| forward_Cluster_MemberList_0 = runtime.ForwardResponseMessage |
| |
| forward_Cluster_MemberPromote_0 = runtime.ForwardResponseMessage |
| ) |
| |
| // RegisterMaintenanceHandlerFromEndpoint is same as RegisterMaintenanceHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterMaintenanceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterMaintenanceHandler(ctx, mux, conn) |
| } |
| |
| // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterMaintenanceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterMaintenanceHandlerClient(ctx, mux, etcdserverpb.NewMaintenanceClient(conn)) |
| } |
| |
| // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "MaintenanceClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "MaintenanceClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "MaintenanceClient" to call the correct interceptors. |
| func RegisterMaintenanceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.MaintenanceClient) error { |
| |
| mux.Handle("POST", pattern_Maintenance_Alarm_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_Alarm_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_Alarm_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_Status_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_Defragment_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_Defragment_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_Defragment_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_Hash_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_Hash_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_Hash_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_HashKV_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_HashKV_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_HashKV_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_Snapshot_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_Snapshot_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_Snapshot_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Maintenance_MoveLeader_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Maintenance_MoveLeader_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Maintenance_MoveLeader_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_Maintenance_Alarm_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "alarm"}, "")) |
| |
| pattern_Maintenance_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "status"}, "")) |
| |
| pattern_Maintenance_Defragment_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "defragment"}, "")) |
| |
| pattern_Maintenance_Hash_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "hash"}, "")) |
| |
| pattern_Maintenance_HashKV_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "hash"}, "")) |
| |
| pattern_Maintenance_Snapshot_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "snapshot"}, "")) |
| |
| pattern_Maintenance_MoveLeader_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "maintenance", "transfer-leadership"}, "")) |
| ) |
| |
| var ( |
| forward_Maintenance_Alarm_0 = runtime.ForwardResponseMessage |
| |
| forward_Maintenance_Status_0 = runtime.ForwardResponseMessage |
| |
| forward_Maintenance_Defragment_0 = runtime.ForwardResponseMessage |
| |
| forward_Maintenance_Hash_0 = runtime.ForwardResponseMessage |
| |
| forward_Maintenance_HashKV_0 = runtime.ForwardResponseMessage |
| |
| forward_Maintenance_Snapshot_0 = runtime.ForwardResponseStream |
| |
| forward_Maintenance_MoveLeader_0 = runtime.ForwardResponseMessage |
| ) |
| |
| // RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done. |
| func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { |
| conn, err := grpc.Dial(endpoint, opts...) |
| if err != nil { |
| return err |
| } |
| defer func() { |
| if err != nil { |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| return |
| } |
| go func() { |
| <-ctx.Done() |
| if cerr := conn.Close(); cerr != nil { |
| grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) |
| } |
| }() |
| }() |
| |
| return RegisterAuthHandler(ctx, mux, conn) |
| } |
| |
| // RegisterAuthHandler registers the http handlers for service Auth to "mux". |
| // The handlers forward requests to the grpc endpoint over "conn". |
| func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { |
| return RegisterAuthHandlerClient(ctx, mux, etcdserverpb.NewAuthClient(conn)) |
| } |
| |
| // RegisterAuthHandler registers the http handlers for service Auth to "mux". |
| // The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient". |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient" |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in |
| // "AuthClient" to call the correct interceptors. |
| func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.AuthClient) error { |
| |
| mux.Handle("POST", pattern_Auth_AuthEnable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_AuthEnable_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_AuthEnable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_AuthDisable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_AuthDisable_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_AuthDisable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_Authenticate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserAdd_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserGet_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserList_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserDelete_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserChangePassword_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserGrantRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserGrantRole_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserGrantRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_UserRevokeRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_UserRevokeRole_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_UserRevokeRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleAdd_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleGet_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleList_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleDelete_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleGrantPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleGrantPermission_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleGrantPermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| mux.Handle("POST", pattern_Auth_RoleRevokePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { |
| ctx, cancel := context.WithCancel(req.Context()) |
| defer cancel() |
| if cn, ok := w.(http.CloseNotifier); ok { |
| go func(done <-chan struct{}, closed <-chan bool) { |
| select { |
| case <-done: |
| case <-closed: |
| cancel() |
| } |
| }(ctx.Done(), cn.CloseNotify()) |
| } |
| inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) |
| rctx, err := runtime.AnnotateContext(ctx, mux, req) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| resp, md, err := request_Auth_RoleRevokePermission_0(rctx, inboundMarshaler, client, req, pathParams) |
| ctx = runtime.NewServerMetadataContext(ctx, md) |
| if err != nil { |
| runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) |
| return |
| } |
| |
| forward_Auth_RoleRevokePermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) |
| |
| }) |
| |
| return nil |
| } |
| |
| var ( |
| pattern_Auth_AuthEnable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "auth", "enable"}, "")) |
| |
| pattern_Auth_AuthDisable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "auth", "disable"}, "")) |
| |
| pattern_Auth_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "auth", "authenticate"}, "")) |
| |
| pattern_Auth_UserAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "add"}, "")) |
| |
| pattern_Auth_UserGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "get"}, "")) |
| |
| pattern_Auth_UserList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "list"}, "")) |
| |
| pattern_Auth_UserDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "delete"}, "")) |
| |
| pattern_Auth_UserChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "changepw"}, "")) |
| |
| pattern_Auth_UserGrantRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "grant"}, "")) |
| |
| pattern_Auth_UserRevokeRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "user", "revoke"}, "")) |
| |
| pattern_Auth_RoleAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "add"}, "")) |
| |
| pattern_Auth_RoleGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "get"}, "")) |
| |
| pattern_Auth_RoleList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "list"}, "")) |
| |
| pattern_Auth_RoleDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "delete"}, "")) |
| |
| pattern_Auth_RoleGrantPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "grant"}, "")) |
| |
| pattern_Auth_RoleRevokePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3", "auth", "role", "revoke"}, "")) |
| ) |
| |
| var ( |
| forward_Auth_AuthEnable_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_AuthDisable_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_Authenticate_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserAdd_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserGet_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserList_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserDelete_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserChangePassword_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserGrantRole_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_UserRevokeRole_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleAdd_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleGet_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleList_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleDelete_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleGrantPermission_0 = runtime.ForwardResponseMessage |
| |
| forward_Auth_RoleRevokePermission_0 = runtime.ForwardResponseMessage |
| ) |