blob: 1eeeff1853f772ba1ad57345ce48aec21d297792 [file] [log] [blame]
khenaidooab1f7bd2019-11-14 14:00:27 -05001// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2// source: etcdserver/api/v3lock/v3lockpb/v3lock.proto
3
4/*
5Package v3lockpb is a reverse proxy.
6
7It translates gRPC into RESTful JSON APIs.
8*/
9package gw
10
11import (
12 "go.etcd.io/etcd/etcdserver/api/v3lock/v3lockpb"
13 "io"
14 "net/http"
15
16 "github.com/golang/protobuf/proto"
17 "github.com/grpc-ecosystem/grpc-gateway/runtime"
18 "github.com/grpc-ecosystem/grpc-gateway/utilities"
19 "golang.org/x/net/context"
20 "google.golang.org/grpc"
21 "google.golang.org/grpc/codes"
22 "google.golang.org/grpc/grpclog"
23 "google.golang.org/grpc/status"
24)
25
26var _ codes.Code
27var _ io.Reader
28var _ status.Status
29var _ = runtime.String
30var _ = utilities.NewDoubleArray
31
32func request_Lock_Lock_0(ctx context.Context, marshaler runtime.Marshaler, client v3lockpb.LockClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
33 var protoReq v3lockpb.LockRequest
34 var metadata runtime.ServerMetadata
35
36 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
37 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
38 }
39
40 msg, err := client.Lock(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
41 return msg, metadata, err
42
43}
44
45func request_Lock_Unlock_0(ctx context.Context, marshaler runtime.Marshaler, client v3lockpb.LockClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
46 var protoReq v3lockpb.UnlockRequest
47 var metadata runtime.ServerMetadata
48
49 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
50 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
51 }
52
53 msg, err := client.Unlock(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
54 return msg, metadata, err
55
56}
57
58// RegisterLockHandlerFromEndpoint is same as RegisterLockHandler but
59// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
60func RegisterLockHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
61 conn, err := grpc.Dial(endpoint, opts...)
62 if err != nil {
63 return err
64 }
65 defer func() {
66 if err != nil {
67 if cerr := conn.Close(); cerr != nil {
68 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
69 }
70 return
71 }
72 go func() {
73 <-ctx.Done()
74 if cerr := conn.Close(); cerr != nil {
75 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
76 }
77 }()
78 }()
79
80 return RegisterLockHandler(ctx, mux, conn)
81}
82
83// RegisterLockHandler registers the http handlers for service Lock to "mux".
84// The handlers forward requests to the grpc endpoint over "conn".
85func RegisterLockHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
86 return RegisterLockHandlerClient(ctx, mux, v3lockpb.NewLockClient(conn))
87}
88
89// RegisterLockHandler registers the http handlers for service Lock to "mux".
90// The handlers forward requests to the grpc endpoint over the given implementation of "LockClient".
91// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "LockClient"
92// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
93// "LockClient" to call the correct interceptors.
94func RegisterLockHandlerClient(ctx context.Context, mux *runtime.ServeMux, client v3lockpb.LockClient) error {
95
96 mux.Handle("POST", pattern_Lock_Lock_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
97 ctx, cancel := context.WithCancel(req.Context())
98 defer cancel()
99 if cn, ok := w.(http.CloseNotifier); ok {
100 go func(done <-chan struct{}, closed <-chan bool) {
101 select {
102 case <-done:
103 case <-closed:
104 cancel()
105 }
106 }(ctx.Done(), cn.CloseNotify())
107 }
108 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
109 rctx, err := runtime.AnnotateContext(ctx, mux, req)
110 if err != nil {
111 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
112 return
113 }
114 resp, md, err := request_Lock_Lock_0(rctx, inboundMarshaler, client, req, pathParams)
115 ctx = runtime.NewServerMetadataContext(ctx, md)
116 if err != nil {
117 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
118 return
119 }
120
121 forward_Lock_Lock_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
122
123 })
124
125 mux.Handle("POST", pattern_Lock_Unlock_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
126 ctx, cancel := context.WithCancel(req.Context())
127 defer cancel()
128 if cn, ok := w.(http.CloseNotifier); ok {
129 go func(done <-chan struct{}, closed <-chan bool) {
130 select {
131 case <-done:
132 case <-closed:
133 cancel()
134 }
135 }(ctx.Done(), cn.CloseNotify())
136 }
137 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
138 rctx, err := runtime.AnnotateContext(ctx, mux, req)
139 if err != nil {
140 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
141 return
142 }
143 resp, md, err := request_Lock_Unlock_0(rctx, inboundMarshaler, client, req, pathParams)
144 ctx = runtime.NewServerMetadataContext(ctx, md)
145 if err != nil {
146 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
147 return
148 }
149
150 forward_Lock_Unlock_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
151
152 })
153
154 return nil
155}
156
157var (
158 pattern_Lock_Lock_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 1}, []string{"v3", "lock"}, ""))
159
160 pattern_Lock_Unlock_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3", "lock", "unlock"}, ""))
161)
162
163var (
164 forward_Lock_Lock_0 = runtime.ForwardResponseMessage
165
166 forward_Lock_Unlock_0 = runtime.ForwardResponseMessage
167)