blob: c50525ba392dfb90e8f910e17af6505846edf464 [file] [log] [blame]
khenaidood948f772021-08-11 17:49:24 -04001// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2// source: etcdserver/etcdserverpb/rpc.proto
3
4/*
5Package etcdserverpb is a reverse proxy.
6
7It translates gRPC into RESTful JSON APIs.
8*/
9package gw
10
11import (
12 "github.com/coreos/etcd/etcdserver/etcdserverpb"
13 "io"
14 "net/http"
15
16 "github.com/golang/protobuf/proto"
17 "github.com/grpc-ecosystem/grpc-gateway/runtime"
18 "github.com/grpc-ecosystem/grpc-gateway/utilities"
19 "golang.org/x/net/context"
20 "google.golang.org/grpc"
21 "google.golang.org/grpc/codes"
22 "google.golang.org/grpc/grpclog"
23 "google.golang.org/grpc/status"
24)
25
26var _ codes.Code
27var _ io.Reader
28var _ status.Status
29var _ = runtime.String
30var _ = utilities.NewDoubleArray
31
32func request_KV_Range_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
33 var protoReq etcdserverpb.RangeRequest
34 var metadata runtime.ServerMetadata
35
36 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
37 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
38 }
39
40 msg, err := client.Range(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
41 return msg, metadata, err
42
43}
44
45func request_KV_Put_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
46 var protoReq etcdserverpb.PutRequest
47 var metadata runtime.ServerMetadata
48
49 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
50 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
51 }
52
53 msg, err := client.Put(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
54 return msg, metadata, err
55
56}
57
58func request_KV_DeleteRange_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
59 var protoReq etcdserverpb.DeleteRangeRequest
60 var metadata runtime.ServerMetadata
61
62 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
63 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
64 }
65
66 msg, err := client.DeleteRange(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
67 return msg, metadata, err
68
69}
70
71func request_KV_Txn_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
72 var protoReq etcdserverpb.TxnRequest
73 var metadata runtime.ServerMetadata
74
75 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
76 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
77 }
78
79 msg, err := client.Txn(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
80 return msg, metadata, err
81
82}
83
84func request_KV_Compact_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
85 var protoReq etcdserverpb.CompactionRequest
86 var metadata runtime.ServerMetadata
87
88 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
89 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
90 }
91
92 msg, err := client.Compact(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
93 return msg, metadata, err
94
95}
96
97func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.WatchClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Watch_WatchClient, runtime.ServerMetadata, error) {
98 var metadata runtime.ServerMetadata
99 stream, err := client.Watch(ctx)
100 if err != nil {
101 grpclog.Printf("Failed to start streaming: %v", err)
102 return nil, metadata, err
103 }
104 dec := marshaler.NewDecoder(req.Body)
105 handleSend := func() error {
106 var protoReq etcdserverpb.WatchRequest
107 err = dec.Decode(&protoReq)
108 if err == io.EOF {
109 return err
110 }
111 if err != nil {
112 grpclog.Printf("Failed to decode request: %v", err)
113 return err
114 }
115 if err = stream.Send(&protoReq); err != nil {
116 grpclog.Printf("Failed to send request: %v", err)
117 return err
118 }
119 return nil
120 }
121 if err := handleSend(); err != nil {
122 if cerr := stream.CloseSend(); cerr != nil {
123 grpclog.Printf("Failed to terminate client stream: %v", cerr)
124 }
125 if err == io.EOF {
126 return stream, metadata, nil
127 }
128 return nil, metadata, err
129 }
130 go func() {
131 for {
132 if err := handleSend(); err != nil {
133 break
134 }
135 }
136 if err := stream.CloseSend(); err != nil {
137 grpclog.Printf("Failed to terminate client stream: %v", err)
138 }
139 }()
140 header, err := stream.Header()
141 if err != nil {
142 grpclog.Printf("Failed to get header from client: %v", err)
143 return nil, metadata, err
144 }
145 metadata.HeaderMD = header
146 return stream, metadata, nil
147}
148
149func request_Lease_LeaseGrant_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
150 var protoReq etcdserverpb.LeaseGrantRequest
151 var metadata runtime.ServerMetadata
152
153 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
154 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
155 }
156
157 msg, err := client.LeaseGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
158 return msg, metadata, err
159
160}
161
162func request_Lease_LeaseRevoke_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
163 var protoReq etcdserverpb.LeaseRevokeRequest
164 var metadata runtime.ServerMetadata
165
166 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
167 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
168 }
169
170 msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
171 return msg, metadata, err
172
173}
174
175func request_Lease_LeaseKeepAlive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Lease_LeaseKeepAliveClient, runtime.ServerMetadata, error) {
176 var metadata runtime.ServerMetadata
177 stream, err := client.LeaseKeepAlive(ctx)
178 if err != nil {
179 grpclog.Printf("Failed to start streaming: %v", err)
180 return nil, metadata, err
181 }
182 dec := marshaler.NewDecoder(req.Body)
183 handleSend := func() error {
184 var protoReq etcdserverpb.LeaseKeepAliveRequest
185 err = dec.Decode(&protoReq)
186 if err == io.EOF {
187 return err
188 }
189 if err != nil {
190 grpclog.Printf("Failed to decode request: %v", err)
191 return err
192 }
193 if err = stream.Send(&protoReq); err != nil {
194 grpclog.Printf("Failed to send request: %v", err)
195 return err
196 }
197 return nil
198 }
199 if err := handleSend(); err != nil {
200 if cerr := stream.CloseSend(); cerr != nil {
201 grpclog.Printf("Failed to terminate client stream: %v", cerr)
202 }
203 if err == io.EOF {
204 return stream, metadata, nil
205 }
206 return nil, metadata, err
207 }
208 go func() {
209 for {
210 if err := handleSend(); err != nil {
211 break
212 }
213 }
214 if err := stream.CloseSend(); err != nil {
215 grpclog.Printf("Failed to terminate client stream: %v", err)
216 }
217 }()
218 header, err := stream.Header()
219 if err != nil {
220 grpclog.Printf("Failed to get header from client: %v", err)
221 return nil, metadata, err
222 }
223 metadata.HeaderMD = header
224 return stream, metadata, nil
225}
226
227func request_Lease_LeaseTimeToLive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
228 var protoReq etcdserverpb.LeaseTimeToLiveRequest
229 var metadata runtime.ServerMetadata
230
231 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
232 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
233 }
234
235 msg, err := client.LeaseTimeToLive(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
236 return msg, metadata, err
237
238}
239
240func request_Lease_LeaseLeases_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
241 var protoReq etcdserverpb.LeaseLeasesRequest
242 var metadata runtime.ServerMetadata
243
244 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
245 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
246 }
247
248 msg, err := client.LeaseLeases(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
249 return msg, metadata, err
250
251}
252
253func request_Cluster_MemberAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
254 var protoReq etcdserverpb.MemberAddRequest
255 var metadata runtime.ServerMetadata
256
257 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
258 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
259 }
260
261 msg, err := client.MemberAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
262 return msg, metadata, err
263
264}
265
266func request_Cluster_MemberRemove_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
267 var protoReq etcdserverpb.MemberRemoveRequest
268 var metadata runtime.ServerMetadata
269
270 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
271 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
272 }
273
274 msg, err := client.MemberRemove(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
275 return msg, metadata, err
276
277}
278
279func request_Cluster_MemberUpdate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
280 var protoReq etcdserverpb.MemberUpdateRequest
281 var metadata runtime.ServerMetadata
282
283 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
284 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
285 }
286
287 msg, err := client.MemberUpdate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
288 return msg, metadata, err
289
290}
291
292func request_Cluster_MemberList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
293 var protoReq etcdserverpb.MemberListRequest
294 var metadata runtime.ServerMetadata
295
296 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
297 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
298 }
299
300 msg, err := client.MemberList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
301 return msg, metadata, err
302
303}
304
305func request_Maintenance_Alarm_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
306 var protoReq etcdserverpb.AlarmRequest
307 var metadata runtime.ServerMetadata
308
309 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
310 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
311 }
312
313 msg, err := client.Alarm(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
314 return msg, metadata, err
315
316}
317
318func request_Maintenance_Status_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
319 var protoReq etcdserverpb.StatusRequest
320 var metadata runtime.ServerMetadata
321
322 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
323 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
324 }
325
326 msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
327 return msg, metadata, err
328
329}
330
331func request_Maintenance_Defragment_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
332 var protoReq etcdserverpb.DefragmentRequest
333 var metadata runtime.ServerMetadata
334
335 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
336 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
337 }
338
339 msg, err := client.Defragment(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
340 return msg, metadata, err
341
342}
343
344func request_Maintenance_Hash_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
345 var protoReq etcdserverpb.HashRequest
346 var metadata runtime.ServerMetadata
347
348 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
349 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
350 }
351
352 msg, err := client.Hash(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
353 return msg, metadata, err
354
355}
356
357func request_Maintenance_HashKV_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
358 var protoReq etcdserverpb.HashKVRequest
359 var metadata runtime.ServerMetadata
360
361 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
362 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
363 }
364
365 msg, err := client.HashKV(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
366 return msg, metadata, err
367
368}
369
370func request_Maintenance_Snapshot_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Maintenance_SnapshotClient, runtime.ServerMetadata, error) {
371 var protoReq etcdserverpb.SnapshotRequest
372 var metadata runtime.ServerMetadata
373
374 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
375 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
376 }
377
378 stream, err := client.Snapshot(ctx, &protoReq)
379 if err != nil {
380 return nil, metadata, err
381 }
382 header, err := stream.Header()
383 if err != nil {
384 return nil, metadata, err
385 }
386 metadata.HeaderMD = header
387 return stream, metadata, nil
388
389}
390
391func request_Maintenance_MoveLeader_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
392 var protoReq etcdserverpb.MoveLeaderRequest
393 var metadata runtime.ServerMetadata
394
395 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
396 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
397 }
398
399 msg, err := client.MoveLeader(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
400 return msg, metadata, err
401
402}
403
404func request_Auth_AuthEnable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
405 var protoReq etcdserverpb.AuthEnableRequest
406 var metadata runtime.ServerMetadata
407
408 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
409 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
410 }
411
412 msg, err := client.AuthEnable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
413 return msg, metadata, err
414
415}
416
417func request_Auth_AuthDisable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
418 var protoReq etcdserverpb.AuthDisableRequest
419 var metadata runtime.ServerMetadata
420
421 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
422 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
423 }
424
425 msg, err := client.AuthDisable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
426 return msg, metadata, err
427
428}
429
430func request_Auth_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
431 var protoReq etcdserverpb.AuthenticateRequest
432 var metadata runtime.ServerMetadata
433
434 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
435 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
436 }
437
438 msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
439 return msg, metadata, err
440
441}
442
443func request_Auth_UserAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
444 var protoReq etcdserverpb.AuthUserAddRequest
445 var metadata runtime.ServerMetadata
446
447 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
448 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
449 }
450
451 msg, err := client.UserAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
452 return msg, metadata, err
453
454}
455
456func request_Auth_UserGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
457 var protoReq etcdserverpb.AuthUserGetRequest
458 var metadata runtime.ServerMetadata
459
460 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
461 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
462 }
463
464 msg, err := client.UserGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
465 return msg, metadata, err
466
467}
468
469func request_Auth_UserList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
470 var protoReq etcdserverpb.AuthUserListRequest
471 var metadata runtime.ServerMetadata
472
473 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
474 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
475 }
476
477 msg, err := client.UserList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
478 return msg, metadata, err
479
480}
481
482func request_Auth_UserDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
483 var protoReq etcdserverpb.AuthUserDeleteRequest
484 var metadata runtime.ServerMetadata
485
486 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
487 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
488 }
489
490 msg, err := client.UserDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
491 return msg, metadata, err
492
493}
494
495func request_Auth_UserChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
496 var protoReq etcdserverpb.AuthUserChangePasswordRequest
497 var metadata runtime.ServerMetadata
498
499 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
500 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
501 }
502
503 msg, err := client.UserChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
504 return msg, metadata, err
505
506}
507
508func request_Auth_UserGrantRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
509 var protoReq etcdserverpb.AuthUserGrantRoleRequest
510 var metadata runtime.ServerMetadata
511
512 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
513 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
514 }
515
516 msg, err := client.UserGrantRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
517 return msg, metadata, err
518
519}
520
521func request_Auth_UserRevokeRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
522 var protoReq etcdserverpb.AuthUserRevokeRoleRequest
523 var metadata runtime.ServerMetadata
524
525 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
526 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
527 }
528
529 msg, err := client.UserRevokeRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
530 return msg, metadata, err
531
532}
533
534func request_Auth_RoleAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
535 var protoReq etcdserverpb.AuthRoleAddRequest
536 var metadata runtime.ServerMetadata
537
538 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
539 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
540 }
541
542 msg, err := client.RoleAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
543 return msg, metadata, err
544
545}
546
547func request_Auth_RoleGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
548 var protoReq etcdserverpb.AuthRoleGetRequest
549 var metadata runtime.ServerMetadata
550
551 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
552 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
553 }
554
555 msg, err := client.RoleGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
556 return msg, metadata, err
557
558}
559
560func request_Auth_RoleList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
561 var protoReq etcdserverpb.AuthRoleListRequest
562 var metadata runtime.ServerMetadata
563
564 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
565 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
566 }
567
568 msg, err := client.RoleList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
569 return msg, metadata, err
570
571}
572
573func request_Auth_RoleDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
574 var protoReq etcdserverpb.AuthRoleDeleteRequest
575 var metadata runtime.ServerMetadata
576
577 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
578 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
579 }
580
581 msg, err := client.RoleDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
582 return msg, metadata, err
583
584}
585
586func request_Auth_RoleGrantPermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
587 var protoReq etcdserverpb.AuthRoleGrantPermissionRequest
588 var metadata runtime.ServerMetadata
589
590 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
591 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
592 }
593
594 msg, err := client.RoleGrantPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
595 return msg, metadata, err
596
597}
598
599func request_Auth_RoleRevokePermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
600 var protoReq etcdserverpb.AuthRoleRevokePermissionRequest
601 var metadata runtime.ServerMetadata
602
603 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
604 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
605 }
606
607 msg, err := client.RoleRevokePermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
608 return msg, metadata, err
609
610}
611
612// RegisterKVHandlerFromEndpoint is same as RegisterKVHandler but
613// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
614func RegisterKVHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
615 conn, err := grpc.Dial(endpoint, opts...)
616 if err != nil {
617 return err
618 }
619 defer func() {
620 if err != nil {
621 if cerr := conn.Close(); cerr != nil {
622 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
623 }
624 return
625 }
626 go func() {
627 <-ctx.Done()
628 if cerr := conn.Close(); cerr != nil {
629 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
630 }
631 }()
632 }()
633
634 return RegisterKVHandler(ctx, mux, conn)
635}
636
637// RegisterKVHandler registers the http handlers for service KV to "mux".
638// The handlers forward requests to the grpc endpoint over "conn".
639func RegisterKVHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
640 return RegisterKVHandlerClient(ctx, mux, etcdserverpb.NewKVClient(conn))
641}
642
643// RegisterKVHandler registers the http handlers for service KV to "mux".
644// The handlers forward requests to the grpc endpoint over the given implementation of "KVClient".
645// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "KVClient"
646// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
647// "KVClient" to call the correct interceptors.
648func RegisterKVHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.KVClient) error {
649
650 mux.Handle("POST", pattern_KV_Range_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
651 ctx, cancel := context.WithCancel(req.Context())
652 defer cancel()
653 if cn, ok := w.(http.CloseNotifier); ok {
654 go func(done <-chan struct{}, closed <-chan bool) {
655 select {
656 case <-done:
657 case <-closed:
658 cancel()
659 }
660 }(ctx.Done(), cn.CloseNotify())
661 }
662 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
663 rctx, err := runtime.AnnotateContext(ctx, mux, req)
664 if err != nil {
665 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
666 return
667 }
668 resp, md, err := request_KV_Range_0(rctx, inboundMarshaler, client, req, pathParams)
669 ctx = runtime.NewServerMetadataContext(ctx, md)
670 if err != nil {
671 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
672 return
673 }
674
675 forward_KV_Range_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
676
677 })
678
679 mux.Handle("POST", pattern_KV_Put_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
680 ctx, cancel := context.WithCancel(req.Context())
681 defer cancel()
682 if cn, ok := w.(http.CloseNotifier); ok {
683 go func(done <-chan struct{}, closed <-chan bool) {
684 select {
685 case <-done:
686 case <-closed:
687 cancel()
688 }
689 }(ctx.Done(), cn.CloseNotify())
690 }
691 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
692 rctx, err := runtime.AnnotateContext(ctx, mux, req)
693 if err != nil {
694 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
695 return
696 }
697 resp, md, err := request_KV_Put_0(rctx, inboundMarshaler, client, req, pathParams)
698 ctx = runtime.NewServerMetadataContext(ctx, md)
699 if err != nil {
700 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
701 return
702 }
703
704 forward_KV_Put_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
705
706 })
707
708 mux.Handle("POST", pattern_KV_DeleteRange_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
709 ctx, cancel := context.WithCancel(req.Context())
710 defer cancel()
711 if cn, ok := w.(http.CloseNotifier); ok {
712 go func(done <-chan struct{}, closed <-chan bool) {
713 select {
714 case <-done:
715 case <-closed:
716 cancel()
717 }
718 }(ctx.Done(), cn.CloseNotify())
719 }
720 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
721 rctx, err := runtime.AnnotateContext(ctx, mux, req)
722 if err != nil {
723 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
724 return
725 }
726 resp, md, err := request_KV_DeleteRange_0(rctx, inboundMarshaler, client, req, pathParams)
727 ctx = runtime.NewServerMetadataContext(ctx, md)
728 if err != nil {
729 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
730 return
731 }
732
733 forward_KV_DeleteRange_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
734
735 })
736
737 mux.Handle("POST", pattern_KV_Txn_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
738 ctx, cancel := context.WithCancel(req.Context())
739 defer cancel()
740 if cn, ok := w.(http.CloseNotifier); ok {
741 go func(done <-chan struct{}, closed <-chan bool) {
742 select {
743 case <-done:
744 case <-closed:
745 cancel()
746 }
747 }(ctx.Done(), cn.CloseNotify())
748 }
749 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
750 rctx, err := runtime.AnnotateContext(ctx, mux, req)
751 if err != nil {
752 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
753 return
754 }
755 resp, md, err := request_KV_Txn_0(rctx, inboundMarshaler, client, req, pathParams)
756 ctx = runtime.NewServerMetadataContext(ctx, md)
757 if err != nil {
758 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
759 return
760 }
761
762 forward_KV_Txn_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
763
764 })
765
766 mux.Handle("POST", pattern_KV_Compact_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
767 ctx, cancel := context.WithCancel(req.Context())
768 defer cancel()
769 if cn, ok := w.(http.CloseNotifier); ok {
770 go func(done <-chan struct{}, closed <-chan bool) {
771 select {
772 case <-done:
773 case <-closed:
774 cancel()
775 }
776 }(ctx.Done(), cn.CloseNotify())
777 }
778 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
779 rctx, err := runtime.AnnotateContext(ctx, mux, req)
780 if err != nil {
781 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
782 return
783 }
784 resp, md, err := request_KV_Compact_0(rctx, inboundMarshaler, client, req, pathParams)
785 ctx = runtime.NewServerMetadataContext(ctx, md)
786 if err != nil {
787 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
788 return
789 }
790
791 forward_KV_Compact_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
792
793 })
794
795 return nil
796}
797
798var (
799 pattern_KV_Range_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "range"}, ""))
800
801 pattern_KV_Put_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "put"}, ""))
802
803 pattern_KV_DeleteRange_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "deleterange"}, ""))
804
805 pattern_KV_Txn_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "txn"}, ""))
806
807 pattern_KV_Compact_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "compaction"}, ""))
808)
809
810var (
811 forward_KV_Range_0 = runtime.ForwardResponseMessage
812
813 forward_KV_Put_0 = runtime.ForwardResponseMessage
814
815 forward_KV_DeleteRange_0 = runtime.ForwardResponseMessage
816
817 forward_KV_Txn_0 = runtime.ForwardResponseMessage
818
819 forward_KV_Compact_0 = runtime.ForwardResponseMessage
820)
821
822// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
823// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
824func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
825 conn, err := grpc.Dial(endpoint, opts...)
826 if err != nil {
827 return err
828 }
829 defer func() {
830 if err != nil {
831 if cerr := conn.Close(); cerr != nil {
832 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
833 }
834 return
835 }
836 go func() {
837 <-ctx.Done()
838 if cerr := conn.Close(); cerr != nil {
839 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
840 }
841 }()
842 }()
843
844 return RegisterWatchHandler(ctx, mux, conn)
845}
846
847// RegisterWatchHandler registers the http handlers for service Watch to "mux".
848// The handlers forward requests to the grpc endpoint over "conn".
849func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
850 return RegisterWatchHandlerClient(ctx, mux, etcdserverpb.NewWatchClient(conn))
851}
852
853// RegisterWatchHandler registers the http handlers for service Watch to "mux".
854// The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
855// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
856// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
857// "WatchClient" to call the correct interceptors.
858func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.WatchClient) error {
859
860 mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
861 ctx, cancel := context.WithCancel(req.Context())
862 defer cancel()
863 if cn, ok := w.(http.CloseNotifier); ok {
864 go func(done <-chan struct{}, closed <-chan bool) {
865 select {
866 case <-done:
867 case <-closed:
868 cancel()
869 }
870 }(ctx.Done(), cn.CloseNotify())
871 }
872 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
873 rctx, err := runtime.AnnotateContext(ctx, mux, req)
874 if err != nil {
875 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
876 return
877 }
878 resp, md, err := request_Watch_Watch_0(rctx, inboundMarshaler, client, req, pathParams)
879 ctx = runtime.NewServerMetadataContext(ctx, md)
880 if err != nil {
881 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
882 return
883 }
884
885 forward_Watch_Watch_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
886
887 })
888
889 return nil
890}
891
892var (
893 pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v3beta", "watch"}, ""))
894)
895
896var (
897 forward_Watch_Watch_0 = runtime.ForwardResponseStream
898)
899
900// RegisterLeaseHandlerFromEndpoint is same as RegisterLeaseHandler but
901// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
902func RegisterLeaseHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
903 conn, err := grpc.Dial(endpoint, opts...)
904 if err != nil {
905 return err
906 }
907 defer func() {
908 if err != nil {
909 if cerr := conn.Close(); cerr != nil {
910 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
911 }
912 return
913 }
914 go func() {
915 <-ctx.Done()
916 if cerr := conn.Close(); cerr != nil {
917 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
918 }
919 }()
920 }()
921
922 return RegisterLeaseHandler(ctx, mux, conn)
923}
924
925// RegisterLeaseHandler registers the http handlers for service Lease to "mux".
926// The handlers forward requests to the grpc endpoint over "conn".
927func RegisterLeaseHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
928 return RegisterLeaseHandlerClient(ctx, mux, etcdserverpb.NewLeaseClient(conn))
929}
930
931// RegisterLeaseHandler registers the http handlers for service Lease to "mux".
932// The handlers forward requests to the grpc endpoint over the given implementation of "LeaseClient".
933// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "LeaseClient"
934// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
935// "LeaseClient" to call the correct interceptors.
936func RegisterLeaseHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.LeaseClient) error {
937
938 mux.Handle("POST", pattern_Lease_LeaseGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
939 ctx, cancel := context.WithCancel(req.Context())
940 defer cancel()
941 if cn, ok := w.(http.CloseNotifier); ok {
942 go func(done <-chan struct{}, closed <-chan bool) {
943 select {
944 case <-done:
945 case <-closed:
946 cancel()
947 }
948 }(ctx.Done(), cn.CloseNotify())
949 }
950 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
951 rctx, err := runtime.AnnotateContext(ctx, mux, req)
952 if err != nil {
953 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
954 return
955 }
956 resp, md, err := request_Lease_LeaseGrant_0(rctx, inboundMarshaler, client, req, pathParams)
957 ctx = runtime.NewServerMetadataContext(ctx, md)
958 if err != nil {
959 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
960 return
961 }
962
963 forward_Lease_LeaseGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
964
965 })
966
967 mux.Handle("POST", pattern_Lease_LeaseRevoke_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
968 ctx, cancel := context.WithCancel(req.Context())
969 defer cancel()
970 if cn, ok := w.(http.CloseNotifier); ok {
971 go func(done <-chan struct{}, closed <-chan bool) {
972 select {
973 case <-done:
974 case <-closed:
975 cancel()
976 }
977 }(ctx.Done(), cn.CloseNotify())
978 }
979 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
980 rctx, err := runtime.AnnotateContext(ctx, mux, req)
981 if err != nil {
982 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
983 return
984 }
985 resp, md, err := request_Lease_LeaseRevoke_0(rctx, inboundMarshaler, client, req, pathParams)
986 ctx = runtime.NewServerMetadataContext(ctx, md)
987 if err != nil {
988 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
989 return
990 }
991
992 forward_Lease_LeaseRevoke_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
993
994 })
995
996 mux.Handle("POST", pattern_Lease_LeaseKeepAlive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
997 ctx, cancel := context.WithCancel(req.Context())
998 defer cancel()
999 if cn, ok := w.(http.CloseNotifier); ok {
1000 go func(done <-chan struct{}, closed <-chan bool) {
1001 select {
1002 case <-done:
1003 case <-closed:
1004 cancel()
1005 }
1006 }(ctx.Done(), cn.CloseNotify())
1007 }
1008 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1009 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1010 if err != nil {
1011 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1012 return
1013 }
1014 resp, md, err := request_Lease_LeaseKeepAlive_0(rctx, inboundMarshaler, client, req, pathParams)
1015 ctx = runtime.NewServerMetadataContext(ctx, md)
1016 if err != nil {
1017 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1018 return
1019 }
1020
1021 forward_Lease_LeaseKeepAlive_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
1022
1023 })
1024
1025 mux.Handle("POST", pattern_Lease_LeaseTimeToLive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1026 ctx, cancel := context.WithCancel(req.Context())
1027 defer cancel()
1028 if cn, ok := w.(http.CloseNotifier); ok {
1029 go func(done <-chan struct{}, closed <-chan bool) {
1030 select {
1031 case <-done:
1032 case <-closed:
1033 cancel()
1034 }
1035 }(ctx.Done(), cn.CloseNotify())
1036 }
1037 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1038 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1039 if err != nil {
1040 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1041 return
1042 }
1043 resp, md, err := request_Lease_LeaseTimeToLive_0(rctx, inboundMarshaler, client, req, pathParams)
1044 ctx = runtime.NewServerMetadataContext(ctx, md)
1045 if err != nil {
1046 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1047 return
1048 }
1049
1050 forward_Lease_LeaseTimeToLive_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1051
1052 })
1053
1054 mux.Handle("POST", pattern_Lease_LeaseLeases_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1055 ctx, cancel := context.WithCancel(req.Context())
1056 defer cancel()
1057 if cn, ok := w.(http.CloseNotifier); ok {
1058 go func(done <-chan struct{}, closed <-chan bool) {
1059 select {
1060 case <-done:
1061 case <-closed:
1062 cancel()
1063 }
1064 }(ctx.Done(), cn.CloseNotify())
1065 }
1066 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1067 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1068 if err != nil {
1069 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1070 return
1071 }
1072 resp, md, err := request_Lease_LeaseLeases_0(rctx, inboundMarshaler, client, req, pathParams)
1073 ctx = runtime.NewServerMetadataContext(ctx, md)
1074 if err != nil {
1075 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1076 return
1077 }
1078
1079 forward_Lease_LeaseLeases_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1080
1081 })
1082
1083 return nil
1084}
1085
1086var (
1087 pattern_Lease_LeaseGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "grant"}, ""))
1088
1089 pattern_Lease_LeaseRevoke_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "revoke"}, ""))
1090
1091 pattern_Lease_LeaseKeepAlive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "keepalive"}, ""))
1092
1093 pattern_Lease_LeaseTimeToLive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "timetolive"}, ""))
1094
1095 pattern_Lease_LeaseLeases_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "leases"}, ""))
1096)
1097
1098var (
1099 forward_Lease_LeaseGrant_0 = runtime.ForwardResponseMessage
1100
1101 forward_Lease_LeaseRevoke_0 = runtime.ForwardResponseMessage
1102
1103 forward_Lease_LeaseKeepAlive_0 = runtime.ForwardResponseStream
1104
1105 forward_Lease_LeaseTimeToLive_0 = runtime.ForwardResponseMessage
1106
1107 forward_Lease_LeaseLeases_0 = runtime.ForwardResponseMessage
1108)
1109
1110// RegisterClusterHandlerFromEndpoint is same as RegisterClusterHandler but
1111// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
1112func RegisterClusterHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
1113 conn, err := grpc.Dial(endpoint, opts...)
1114 if err != nil {
1115 return err
1116 }
1117 defer func() {
1118 if err != nil {
1119 if cerr := conn.Close(); cerr != nil {
1120 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1121 }
1122 return
1123 }
1124 go func() {
1125 <-ctx.Done()
1126 if cerr := conn.Close(); cerr != nil {
1127 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1128 }
1129 }()
1130 }()
1131
1132 return RegisterClusterHandler(ctx, mux, conn)
1133}
1134
1135// RegisterClusterHandler registers the http handlers for service Cluster to "mux".
1136// The handlers forward requests to the grpc endpoint over "conn".
1137func RegisterClusterHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
1138 return RegisterClusterHandlerClient(ctx, mux, etcdserverpb.NewClusterClient(conn))
1139}
1140
1141// RegisterClusterHandler registers the http handlers for service Cluster to "mux".
1142// The handlers forward requests to the grpc endpoint over the given implementation of "ClusterClient".
1143// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ClusterClient"
1144// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
1145// "ClusterClient" to call the correct interceptors.
1146func RegisterClusterHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.ClusterClient) error {
1147
1148 mux.Handle("POST", pattern_Cluster_MemberAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1149 ctx, cancel := context.WithCancel(req.Context())
1150 defer cancel()
1151 if cn, ok := w.(http.CloseNotifier); ok {
1152 go func(done <-chan struct{}, closed <-chan bool) {
1153 select {
1154 case <-done:
1155 case <-closed:
1156 cancel()
1157 }
1158 }(ctx.Done(), cn.CloseNotify())
1159 }
1160 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1161 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1162 if err != nil {
1163 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1164 return
1165 }
1166 resp, md, err := request_Cluster_MemberAdd_0(rctx, inboundMarshaler, client, req, pathParams)
1167 ctx = runtime.NewServerMetadataContext(ctx, md)
1168 if err != nil {
1169 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1170 return
1171 }
1172
1173 forward_Cluster_MemberAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1174
1175 })
1176
1177 mux.Handle("POST", pattern_Cluster_MemberRemove_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1178 ctx, cancel := context.WithCancel(req.Context())
1179 defer cancel()
1180 if cn, ok := w.(http.CloseNotifier); ok {
1181 go func(done <-chan struct{}, closed <-chan bool) {
1182 select {
1183 case <-done:
1184 case <-closed:
1185 cancel()
1186 }
1187 }(ctx.Done(), cn.CloseNotify())
1188 }
1189 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1190 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1191 if err != nil {
1192 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1193 return
1194 }
1195 resp, md, err := request_Cluster_MemberRemove_0(rctx, inboundMarshaler, client, req, pathParams)
1196 ctx = runtime.NewServerMetadataContext(ctx, md)
1197 if err != nil {
1198 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1199 return
1200 }
1201
1202 forward_Cluster_MemberRemove_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1203
1204 })
1205
1206 mux.Handle("POST", pattern_Cluster_MemberUpdate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1207 ctx, cancel := context.WithCancel(req.Context())
1208 defer cancel()
1209 if cn, ok := w.(http.CloseNotifier); ok {
1210 go func(done <-chan struct{}, closed <-chan bool) {
1211 select {
1212 case <-done:
1213 case <-closed:
1214 cancel()
1215 }
1216 }(ctx.Done(), cn.CloseNotify())
1217 }
1218 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1219 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1220 if err != nil {
1221 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1222 return
1223 }
1224 resp, md, err := request_Cluster_MemberUpdate_0(rctx, inboundMarshaler, client, req, pathParams)
1225 ctx = runtime.NewServerMetadataContext(ctx, md)
1226 if err != nil {
1227 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1228 return
1229 }
1230
1231 forward_Cluster_MemberUpdate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1232
1233 })
1234
1235 mux.Handle("POST", pattern_Cluster_MemberList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1236 ctx, cancel := context.WithCancel(req.Context())
1237 defer cancel()
1238 if cn, ok := w.(http.CloseNotifier); ok {
1239 go func(done <-chan struct{}, closed <-chan bool) {
1240 select {
1241 case <-done:
1242 case <-closed:
1243 cancel()
1244 }
1245 }(ctx.Done(), cn.CloseNotify())
1246 }
1247 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1248 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1249 if err != nil {
1250 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1251 return
1252 }
1253 resp, md, err := request_Cluster_MemberList_0(rctx, inboundMarshaler, client, req, pathParams)
1254 ctx = runtime.NewServerMetadataContext(ctx, md)
1255 if err != nil {
1256 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1257 return
1258 }
1259
1260 forward_Cluster_MemberList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1261
1262 })
1263
1264 return nil
1265}
1266
1267var (
1268 pattern_Cluster_MemberAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "add"}, ""))
1269
1270 pattern_Cluster_MemberRemove_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "remove"}, ""))
1271
1272 pattern_Cluster_MemberUpdate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "update"}, ""))
1273
1274 pattern_Cluster_MemberList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "list"}, ""))
1275)
1276
1277var (
1278 forward_Cluster_MemberAdd_0 = runtime.ForwardResponseMessage
1279
1280 forward_Cluster_MemberRemove_0 = runtime.ForwardResponseMessage
1281
1282 forward_Cluster_MemberUpdate_0 = runtime.ForwardResponseMessage
1283
1284 forward_Cluster_MemberList_0 = runtime.ForwardResponseMessage
1285)
1286
1287// RegisterMaintenanceHandlerFromEndpoint is same as RegisterMaintenanceHandler but
1288// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
1289func RegisterMaintenanceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
1290 conn, err := grpc.Dial(endpoint, opts...)
1291 if err != nil {
1292 return err
1293 }
1294 defer func() {
1295 if err != nil {
1296 if cerr := conn.Close(); cerr != nil {
1297 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1298 }
1299 return
1300 }
1301 go func() {
1302 <-ctx.Done()
1303 if cerr := conn.Close(); cerr != nil {
1304 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1305 }
1306 }()
1307 }()
1308
1309 return RegisterMaintenanceHandler(ctx, mux, conn)
1310}
1311
1312// RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux".
1313// The handlers forward requests to the grpc endpoint over "conn".
1314func RegisterMaintenanceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
1315 return RegisterMaintenanceHandlerClient(ctx, mux, etcdserverpb.NewMaintenanceClient(conn))
1316}
1317
1318// RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux".
1319// The handlers forward requests to the grpc endpoint over the given implementation of "MaintenanceClient".
1320// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "MaintenanceClient"
1321// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
1322// "MaintenanceClient" to call the correct interceptors.
1323func RegisterMaintenanceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.MaintenanceClient) error {
1324
1325 mux.Handle("POST", pattern_Maintenance_Alarm_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1326 ctx, cancel := context.WithCancel(req.Context())
1327 defer cancel()
1328 if cn, ok := w.(http.CloseNotifier); ok {
1329 go func(done <-chan struct{}, closed <-chan bool) {
1330 select {
1331 case <-done:
1332 case <-closed:
1333 cancel()
1334 }
1335 }(ctx.Done(), cn.CloseNotify())
1336 }
1337 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1338 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1339 if err != nil {
1340 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1341 return
1342 }
1343 resp, md, err := request_Maintenance_Alarm_0(rctx, inboundMarshaler, client, req, pathParams)
1344 ctx = runtime.NewServerMetadataContext(ctx, md)
1345 if err != nil {
1346 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1347 return
1348 }
1349
1350 forward_Maintenance_Alarm_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1351
1352 })
1353
1354 mux.Handle("POST", pattern_Maintenance_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1355 ctx, cancel := context.WithCancel(req.Context())
1356 defer cancel()
1357 if cn, ok := w.(http.CloseNotifier); ok {
1358 go func(done <-chan struct{}, closed <-chan bool) {
1359 select {
1360 case <-done:
1361 case <-closed:
1362 cancel()
1363 }
1364 }(ctx.Done(), cn.CloseNotify())
1365 }
1366 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1367 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1368 if err != nil {
1369 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1370 return
1371 }
1372 resp, md, err := request_Maintenance_Status_0(rctx, inboundMarshaler, client, req, pathParams)
1373 ctx = runtime.NewServerMetadataContext(ctx, md)
1374 if err != nil {
1375 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1376 return
1377 }
1378
1379 forward_Maintenance_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1380
1381 })
1382
1383 mux.Handle("POST", pattern_Maintenance_Defragment_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1384 ctx, cancel := context.WithCancel(req.Context())
1385 defer cancel()
1386 if cn, ok := w.(http.CloseNotifier); ok {
1387 go func(done <-chan struct{}, closed <-chan bool) {
1388 select {
1389 case <-done:
1390 case <-closed:
1391 cancel()
1392 }
1393 }(ctx.Done(), cn.CloseNotify())
1394 }
1395 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1396 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1397 if err != nil {
1398 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1399 return
1400 }
1401 resp, md, err := request_Maintenance_Defragment_0(rctx, inboundMarshaler, client, req, pathParams)
1402 ctx = runtime.NewServerMetadataContext(ctx, md)
1403 if err != nil {
1404 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1405 return
1406 }
1407
1408 forward_Maintenance_Defragment_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1409
1410 })
1411
1412 mux.Handle("POST", pattern_Maintenance_Hash_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1413 ctx, cancel := context.WithCancel(req.Context())
1414 defer cancel()
1415 if cn, ok := w.(http.CloseNotifier); ok {
1416 go func(done <-chan struct{}, closed <-chan bool) {
1417 select {
1418 case <-done:
1419 case <-closed:
1420 cancel()
1421 }
1422 }(ctx.Done(), cn.CloseNotify())
1423 }
1424 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1425 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1426 if err != nil {
1427 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1428 return
1429 }
1430 resp, md, err := request_Maintenance_Hash_0(rctx, inboundMarshaler, client, req, pathParams)
1431 ctx = runtime.NewServerMetadataContext(ctx, md)
1432 if err != nil {
1433 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1434 return
1435 }
1436
1437 forward_Maintenance_Hash_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1438
1439 })
1440
1441 mux.Handle("POST", pattern_Maintenance_HashKV_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1442 ctx, cancel := context.WithCancel(req.Context())
1443 defer cancel()
1444 if cn, ok := w.(http.CloseNotifier); ok {
1445 go func(done <-chan struct{}, closed <-chan bool) {
1446 select {
1447 case <-done:
1448 case <-closed:
1449 cancel()
1450 }
1451 }(ctx.Done(), cn.CloseNotify())
1452 }
1453 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1454 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1455 if err != nil {
1456 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1457 return
1458 }
1459 resp, md, err := request_Maintenance_HashKV_0(rctx, inboundMarshaler, client, req, pathParams)
1460 ctx = runtime.NewServerMetadataContext(ctx, md)
1461 if err != nil {
1462 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1463 return
1464 }
1465
1466 forward_Maintenance_HashKV_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1467
1468 })
1469
1470 mux.Handle("POST", pattern_Maintenance_Snapshot_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1471 ctx, cancel := context.WithCancel(req.Context())
1472 defer cancel()
1473 if cn, ok := w.(http.CloseNotifier); ok {
1474 go func(done <-chan struct{}, closed <-chan bool) {
1475 select {
1476 case <-done:
1477 case <-closed:
1478 cancel()
1479 }
1480 }(ctx.Done(), cn.CloseNotify())
1481 }
1482 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1483 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1484 if err != nil {
1485 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1486 return
1487 }
1488 resp, md, err := request_Maintenance_Snapshot_0(rctx, inboundMarshaler, client, req, pathParams)
1489 ctx = runtime.NewServerMetadataContext(ctx, md)
1490 if err != nil {
1491 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1492 return
1493 }
1494
1495 forward_Maintenance_Snapshot_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
1496
1497 })
1498
1499 mux.Handle("POST", pattern_Maintenance_MoveLeader_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1500 ctx, cancel := context.WithCancel(req.Context())
1501 defer cancel()
1502 if cn, ok := w.(http.CloseNotifier); ok {
1503 go func(done <-chan struct{}, closed <-chan bool) {
1504 select {
1505 case <-done:
1506 case <-closed:
1507 cancel()
1508 }
1509 }(ctx.Done(), cn.CloseNotify())
1510 }
1511 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1512 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1513 if err != nil {
1514 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1515 return
1516 }
1517 resp, md, err := request_Maintenance_MoveLeader_0(rctx, inboundMarshaler, client, req, pathParams)
1518 ctx = runtime.NewServerMetadataContext(ctx, md)
1519 if err != nil {
1520 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1521 return
1522 }
1523
1524 forward_Maintenance_MoveLeader_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1525
1526 })
1527
1528 return nil
1529}
1530
1531var (
1532 pattern_Maintenance_Alarm_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "alarm"}, ""))
1533
1534 pattern_Maintenance_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "status"}, ""))
1535
1536 pattern_Maintenance_Defragment_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "defragment"}, ""))
1537
1538 pattern_Maintenance_Hash_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, ""))
1539
1540 pattern_Maintenance_HashKV_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, ""))
1541
1542 pattern_Maintenance_Snapshot_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "snapshot"}, ""))
1543
1544 pattern_Maintenance_MoveLeader_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "transfer-leadership"}, ""))
1545)
1546
1547var (
1548 forward_Maintenance_Alarm_0 = runtime.ForwardResponseMessage
1549
1550 forward_Maintenance_Status_0 = runtime.ForwardResponseMessage
1551
1552 forward_Maintenance_Defragment_0 = runtime.ForwardResponseMessage
1553
1554 forward_Maintenance_Hash_0 = runtime.ForwardResponseMessage
1555
1556 forward_Maintenance_HashKV_0 = runtime.ForwardResponseMessage
1557
1558 forward_Maintenance_Snapshot_0 = runtime.ForwardResponseStream
1559
1560 forward_Maintenance_MoveLeader_0 = runtime.ForwardResponseMessage
1561)
1562
1563// RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but
1564// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
1565func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
1566 conn, err := grpc.Dial(endpoint, opts...)
1567 if err != nil {
1568 return err
1569 }
1570 defer func() {
1571 if err != nil {
1572 if cerr := conn.Close(); cerr != nil {
1573 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1574 }
1575 return
1576 }
1577 go func() {
1578 <-ctx.Done()
1579 if cerr := conn.Close(); cerr != nil {
1580 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
1581 }
1582 }()
1583 }()
1584
1585 return RegisterAuthHandler(ctx, mux, conn)
1586}
1587
1588// RegisterAuthHandler registers the http handlers for service Auth to "mux".
1589// The handlers forward requests to the grpc endpoint over "conn".
1590func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
1591 return RegisterAuthHandlerClient(ctx, mux, etcdserverpb.NewAuthClient(conn))
1592}
1593
1594// RegisterAuthHandler registers the http handlers for service Auth to "mux".
1595// The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient".
1596// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient"
1597// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
1598// "AuthClient" to call the correct interceptors.
1599func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.AuthClient) error {
1600
1601 mux.Handle("POST", pattern_Auth_AuthEnable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1602 ctx, cancel := context.WithCancel(req.Context())
1603 defer cancel()
1604 if cn, ok := w.(http.CloseNotifier); ok {
1605 go func(done <-chan struct{}, closed <-chan bool) {
1606 select {
1607 case <-done:
1608 case <-closed:
1609 cancel()
1610 }
1611 }(ctx.Done(), cn.CloseNotify())
1612 }
1613 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1614 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1615 if err != nil {
1616 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1617 return
1618 }
1619 resp, md, err := request_Auth_AuthEnable_0(rctx, inboundMarshaler, client, req, pathParams)
1620 ctx = runtime.NewServerMetadataContext(ctx, md)
1621 if err != nil {
1622 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1623 return
1624 }
1625
1626 forward_Auth_AuthEnable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1627
1628 })
1629
1630 mux.Handle("POST", pattern_Auth_AuthDisable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1631 ctx, cancel := context.WithCancel(req.Context())
1632 defer cancel()
1633 if cn, ok := w.(http.CloseNotifier); ok {
1634 go func(done <-chan struct{}, closed <-chan bool) {
1635 select {
1636 case <-done:
1637 case <-closed:
1638 cancel()
1639 }
1640 }(ctx.Done(), cn.CloseNotify())
1641 }
1642 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1643 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1644 if err != nil {
1645 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1646 return
1647 }
1648 resp, md, err := request_Auth_AuthDisable_0(rctx, inboundMarshaler, client, req, pathParams)
1649 ctx = runtime.NewServerMetadataContext(ctx, md)
1650 if err != nil {
1651 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1652 return
1653 }
1654
1655 forward_Auth_AuthDisable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1656
1657 })
1658
1659 mux.Handle("POST", pattern_Auth_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1660 ctx, cancel := context.WithCancel(req.Context())
1661 defer cancel()
1662 if cn, ok := w.(http.CloseNotifier); ok {
1663 go func(done <-chan struct{}, closed <-chan bool) {
1664 select {
1665 case <-done:
1666 case <-closed:
1667 cancel()
1668 }
1669 }(ctx.Done(), cn.CloseNotify())
1670 }
1671 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1672 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1673 if err != nil {
1674 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1675 return
1676 }
1677 resp, md, err := request_Auth_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams)
1678 ctx = runtime.NewServerMetadataContext(ctx, md)
1679 if err != nil {
1680 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1681 return
1682 }
1683
1684 forward_Auth_Authenticate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1685
1686 })
1687
1688 mux.Handle("POST", pattern_Auth_UserAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1689 ctx, cancel := context.WithCancel(req.Context())
1690 defer cancel()
1691 if cn, ok := w.(http.CloseNotifier); ok {
1692 go func(done <-chan struct{}, closed <-chan bool) {
1693 select {
1694 case <-done:
1695 case <-closed:
1696 cancel()
1697 }
1698 }(ctx.Done(), cn.CloseNotify())
1699 }
1700 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1701 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1702 if err != nil {
1703 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1704 return
1705 }
1706 resp, md, err := request_Auth_UserAdd_0(rctx, inboundMarshaler, client, req, pathParams)
1707 ctx = runtime.NewServerMetadataContext(ctx, md)
1708 if err != nil {
1709 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1710 return
1711 }
1712
1713 forward_Auth_UserAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1714
1715 })
1716
1717 mux.Handle("POST", pattern_Auth_UserGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1718 ctx, cancel := context.WithCancel(req.Context())
1719 defer cancel()
1720 if cn, ok := w.(http.CloseNotifier); ok {
1721 go func(done <-chan struct{}, closed <-chan bool) {
1722 select {
1723 case <-done:
1724 case <-closed:
1725 cancel()
1726 }
1727 }(ctx.Done(), cn.CloseNotify())
1728 }
1729 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1730 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1731 if err != nil {
1732 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1733 return
1734 }
1735 resp, md, err := request_Auth_UserGet_0(rctx, inboundMarshaler, client, req, pathParams)
1736 ctx = runtime.NewServerMetadataContext(ctx, md)
1737 if err != nil {
1738 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1739 return
1740 }
1741
1742 forward_Auth_UserGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1743
1744 })
1745
1746 mux.Handle("POST", pattern_Auth_UserList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1747 ctx, cancel := context.WithCancel(req.Context())
1748 defer cancel()
1749 if cn, ok := w.(http.CloseNotifier); ok {
1750 go func(done <-chan struct{}, closed <-chan bool) {
1751 select {
1752 case <-done:
1753 case <-closed:
1754 cancel()
1755 }
1756 }(ctx.Done(), cn.CloseNotify())
1757 }
1758 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1759 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1760 if err != nil {
1761 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1762 return
1763 }
1764 resp, md, err := request_Auth_UserList_0(rctx, inboundMarshaler, client, req, pathParams)
1765 ctx = runtime.NewServerMetadataContext(ctx, md)
1766 if err != nil {
1767 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1768 return
1769 }
1770
1771 forward_Auth_UserList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1772
1773 })
1774
1775 mux.Handle("POST", pattern_Auth_UserDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1776 ctx, cancel := context.WithCancel(req.Context())
1777 defer cancel()
1778 if cn, ok := w.(http.CloseNotifier); ok {
1779 go func(done <-chan struct{}, closed <-chan bool) {
1780 select {
1781 case <-done:
1782 case <-closed:
1783 cancel()
1784 }
1785 }(ctx.Done(), cn.CloseNotify())
1786 }
1787 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1788 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1789 if err != nil {
1790 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1791 return
1792 }
1793 resp, md, err := request_Auth_UserDelete_0(rctx, inboundMarshaler, client, req, pathParams)
1794 ctx = runtime.NewServerMetadataContext(ctx, md)
1795 if err != nil {
1796 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1797 return
1798 }
1799
1800 forward_Auth_UserDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1801
1802 })
1803
1804 mux.Handle("POST", pattern_Auth_UserChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1805 ctx, cancel := context.WithCancel(req.Context())
1806 defer cancel()
1807 if cn, ok := w.(http.CloseNotifier); ok {
1808 go func(done <-chan struct{}, closed <-chan bool) {
1809 select {
1810 case <-done:
1811 case <-closed:
1812 cancel()
1813 }
1814 }(ctx.Done(), cn.CloseNotify())
1815 }
1816 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1817 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1818 if err != nil {
1819 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1820 return
1821 }
1822 resp, md, err := request_Auth_UserChangePassword_0(rctx, inboundMarshaler, client, req, pathParams)
1823 ctx = runtime.NewServerMetadataContext(ctx, md)
1824 if err != nil {
1825 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1826 return
1827 }
1828
1829 forward_Auth_UserChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1830
1831 })
1832
1833 mux.Handle("POST", pattern_Auth_UserGrantRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1834 ctx, cancel := context.WithCancel(req.Context())
1835 defer cancel()
1836 if cn, ok := w.(http.CloseNotifier); ok {
1837 go func(done <-chan struct{}, closed <-chan bool) {
1838 select {
1839 case <-done:
1840 case <-closed:
1841 cancel()
1842 }
1843 }(ctx.Done(), cn.CloseNotify())
1844 }
1845 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1846 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1847 if err != nil {
1848 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1849 return
1850 }
1851 resp, md, err := request_Auth_UserGrantRole_0(rctx, inboundMarshaler, client, req, pathParams)
1852 ctx = runtime.NewServerMetadataContext(ctx, md)
1853 if err != nil {
1854 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1855 return
1856 }
1857
1858 forward_Auth_UserGrantRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1859
1860 })
1861
1862 mux.Handle("POST", pattern_Auth_UserRevokeRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1863 ctx, cancel := context.WithCancel(req.Context())
1864 defer cancel()
1865 if cn, ok := w.(http.CloseNotifier); ok {
1866 go func(done <-chan struct{}, closed <-chan bool) {
1867 select {
1868 case <-done:
1869 case <-closed:
1870 cancel()
1871 }
1872 }(ctx.Done(), cn.CloseNotify())
1873 }
1874 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1875 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1876 if err != nil {
1877 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1878 return
1879 }
1880 resp, md, err := request_Auth_UserRevokeRole_0(rctx, inboundMarshaler, client, req, pathParams)
1881 ctx = runtime.NewServerMetadataContext(ctx, md)
1882 if err != nil {
1883 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1884 return
1885 }
1886
1887 forward_Auth_UserRevokeRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1888
1889 })
1890
1891 mux.Handle("POST", pattern_Auth_RoleAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1892 ctx, cancel := context.WithCancel(req.Context())
1893 defer cancel()
1894 if cn, ok := w.(http.CloseNotifier); ok {
1895 go func(done <-chan struct{}, closed <-chan bool) {
1896 select {
1897 case <-done:
1898 case <-closed:
1899 cancel()
1900 }
1901 }(ctx.Done(), cn.CloseNotify())
1902 }
1903 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1904 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1905 if err != nil {
1906 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1907 return
1908 }
1909 resp, md, err := request_Auth_RoleAdd_0(rctx, inboundMarshaler, client, req, pathParams)
1910 ctx = runtime.NewServerMetadataContext(ctx, md)
1911 if err != nil {
1912 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1913 return
1914 }
1915
1916 forward_Auth_RoleAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1917
1918 })
1919
1920 mux.Handle("POST", pattern_Auth_RoleGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1921 ctx, cancel := context.WithCancel(req.Context())
1922 defer cancel()
1923 if cn, ok := w.(http.CloseNotifier); ok {
1924 go func(done <-chan struct{}, closed <-chan bool) {
1925 select {
1926 case <-done:
1927 case <-closed:
1928 cancel()
1929 }
1930 }(ctx.Done(), cn.CloseNotify())
1931 }
1932 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1933 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1934 if err != nil {
1935 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1936 return
1937 }
1938 resp, md, err := request_Auth_RoleGet_0(rctx, inboundMarshaler, client, req, pathParams)
1939 ctx = runtime.NewServerMetadataContext(ctx, md)
1940 if err != nil {
1941 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1942 return
1943 }
1944
1945 forward_Auth_RoleGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1946
1947 })
1948
1949 mux.Handle("POST", pattern_Auth_RoleList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1950 ctx, cancel := context.WithCancel(req.Context())
1951 defer cancel()
1952 if cn, ok := w.(http.CloseNotifier); ok {
1953 go func(done <-chan struct{}, closed <-chan bool) {
1954 select {
1955 case <-done:
1956 case <-closed:
1957 cancel()
1958 }
1959 }(ctx.Done(), cn.CloseNotify())
1960 }
1961 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1962 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1963 if err != nil {
1964 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1965 return
1966 }
1967 resp, md, err := request_Auth_RoleList_0(rctx, inboundMarshaler, client, req, pathParams)
1968 ctx = runtime.NewServerMetadataContext(ctx, md)
1969 if err != nil {
1970 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1971 return
1972 }
1973
1974 forward_Auth_RoleList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1975
1976 })
1977
1978 mux.Handle("POST", pattern_Auth_RoleDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1979 ctx, cancel := context.WithCancel(req.Context())
1980 defer cancel()
1981 if cn, ok := w.(http.CloseNotifier); ok {
1982 go func(done <-chan struct{}, closed <-chan bool) {
1983 select {
1984 case <-done:
1985 case <-closed:
1986 cancel()
1987 }
1988 }(ctx.Done(), cn.CloseNotify())
1989 }
1990 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1991 rctx, err := runtime.AnnotateContext(ctx, mux, req)
1992 if err != nil {
1993 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1994 return
1995 }
1996 resp, md, err := request_Auth_RoleDelete_0(rctx, inboundMarshaler, client, req, pathParams)
1997 ctx = runtime.NewServerMetadataContext(ctx, md)
1998 if err != nil {
1999 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2000 return
2001 }
2002
2003 forward_Auth_RoleDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2004
2005 })
2006
2007 mux.Handle("POST", pattern_Auth_RoleGrantPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2008 ctx, cancel := context.WithCancel(req.Context())
2009 defer cancel()
2010 if cn, ok := w.(http.CloseNotifier); ok {
2011 go func(done <-chan struct{}, closed <-chan bool) {
2012 select {
2013 case <-done:
2014 case <-closed:
2015 cancel()
2016 }
2017 }(ctx.Done(), cn.CloseNotify())
2018 }
2019 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2020 rctx, err := runtime.AnnotateContext(ctx, mux, req)
2021 if err != nil {
2022 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2023 return
2024 }
2025 resp, md, err := request_Auth_RoleGrantPermission_0(rctx, inboundMarshaler, client, req, pathParams)
2026 ctx = runtime.NewServerMetadataContext(ctx, md)
2027 if err != nil {
2028 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2029 return
2030 }
2031
2032 forward_Auth_RoleGrantPermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2033
2034 })
2035
2036 mux.Handle("POST", pattern_Auth_RoleRevokePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2037 ctx, cancel := context.WithCancel(req.Context())
2038 defer cancel()
2039 if cn, ok := w.(http.CloseNotifier); ok {
2040 go func(done <-chan struct{}, closed <-chan bool) {
2041 select {
2042 case <-done:
2043 case <-closed:
2044 cancel()
2045 }
2046 }(ctx.Done(), cn.CloseNotify())
2047 }
2048 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2049 rctx, err := runtime.AnnotateContext(ctx, mux, req)
2050 if err != nil {
2051 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2052 return
2053 }
2054 resp, md, err := request_Auth_RoleRevokePermission_0(rctx, inboundMarshaler, client, req, pathParams)
2055 ctx = runtime.NewServerMetadataContext(ctx, md)
2056 if err != nil {
2057 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2058 return
2059 }
2060
2061 forward_Auth_RoleRevokePermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2062
2063 })
2064
2065 return nil
2066}
2067
2068var (
2069 pattern_Auth_AuthEnable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "enable"}, ""))
2070
2071 pattern_Auth_AuthDisable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "disable"}, ""))
2072
2073 pattern_Auth_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "authenticate"}, ""))
2074
2075 pattern_Auth_UserAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "add"}, ""))
2076
2077 pattern_Auth_UserGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "get"}, ""))
2078
2079 pattern_Auth_UserList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "list"}, ""))
2080
2081 pattern_Auth_UserDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "delete"}, ""))
2082
2083 pattern_Auth_UserChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "changepw"}, ""))
2084
2085 pattern_Auth_UserGrantRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "grant"}, ""))
2086
2087 pattern_Auth_UserRevokeRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "revoke"}, ""))
2088
2089 pattern_Auth_RoleAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "add"}, ""))
2090
2091 pattern_Auth_RoleGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "get"}, ""))
2092
2093 pattern_Auth_RoleList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "list"}, ""))
2094
2095 pattern_Auth_RoleDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "delete"}, ""))
2096
2097 pattern_Auth_RoleGrantPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "grant"}, ""))
2098
2099 pattern_Auth_RoleRevokePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "revoke"}, ""))
2100)
2101
2102var (
2103 forward_Auth_AuthEnable_0 = runtime.ForwardResponseMessage
2104
2105 forward_Auth_AuthDisable_0 = runtime.ForwardResponseMessage
2106
2107 forward_Auth_Authenticate_0 = runtime.ForwardResponseMessage
2108
2109 forward_Auth_UserAdd_0 = runtime.ForwardResponseMessage
2110
2111 forward_Auth_UserGet_0 = runtime.ForwardResponseMessage
2112
2113 forward_Auth_UserList_0 = runtime.ForwardResponseMessage
2114
2115 forward_Auth_UserDelete_0 = runtime.ForwardResponseMessage
2116
2117 forward_Auth_UserChangePassword_0 = runtime.ForwardResponseMessage
2118
2119 forward_Auth_UserGrantRole_0 = runtime.ForwardResponseMessage
2120
2121 forward_Auth_UserRevokeRole_0 = runtime.ForwardResponseMessage
2122
2123 forward_Auth_RoleAdd_0 = runtime.ForwardResponseMessage
2124
2125 forward_Auth_RoleGet_0 = runtime.ForwardResponseMessage
2126
2127 forward_Auth_RoleList_0 = runtime.ForwardResponseMessage
2128
2129 forward_Auth_RoleDelete_0 = runtime.ForwardResponseMessage
2130
2131 forward_Auth_RoleGrantPermission_0 = runtime.ForwardResponseMessage
2132
2133 forward_Auth_RoleRevokePermission_0 = runtime.ForwardResponseMessage
2134)