github.com/InjectiveLabs/sdk-go@v1.53.0/exchange/accounts_rpc/pb/injective_accounts_rpc.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: injective_accounts_rpc.proto
     3  
     4  /*
     5  Package injective_accounts_rpcpb is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package injective_accounts_rpcpb
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    17  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    18  	"google.golang.org/grpc"
    19  	"google.golang.org/grpc/codes"
    20  	"google.golang.org/grpc/grpclog"
    21  	"google.golang.org/grpc/metadata"
    22  	"google.golang.org/grpc/status"
    23  	"google.golang.org/protobuf/proto"
    24  )
    25  
    26  // Suppress "imported and not used" errors
    27  var _ codes.Code
    28  var _ io.Reader
    29  var _ status.Status
    30  var _ = runtime.String
    31  var _ = utilities.NewDoubleArray
    32  var _ = metadata.Join
    33  
    34  func request_InjectiveAccountsRPC_Portfolio_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    35  	var protoReq PortfolioRequest
    36  	var metadata runtime.ServerMetadata
    37  
    38  	newReader, berr := utilities.IOReaderFactory(req.Body)
    39  	if berr != nil {
    40  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    41  	}
    42  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    43  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    44  	}
    45  
    46  	msg, err := client.Portfolio(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    47  	return msg, metadata, err
    48  
    49  }
    50  
    51  func local_request_InjectiveAccountsRPC_Portfolio_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    52  	var protoReq PortfolioRequest
    53  	var metadata runtime.ServerMetadata
    54  
    55  	newReader, berr := utilities.IOReaderFactory(req.Body)
    56  	if berr != nil {
    57  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    58  	}
    59  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    60  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    61  	}
    62  
    63  	msg, err := server.Portfolio(ctx, &protoReq)
    64  	return msg, metadata, err
    65  
    66  }
    67  
    68  func request_InjectiveAccountsRPC_OrderStates_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    69  	var protoReq OrderStatesRequest
    70  	var metadata runtime.ServerMetadata
    71  
    72  	newReader, berr := utilities.IOReaderFactory(req.Body)
    73  	if berr != nil {
    74  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    75  	}
    76  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    77  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    78  	}
    79  
    80  	msg, err := client.OrderStates(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    81  	return msg, metadata, err
    82  
    83  }
    84  
    85  func local_request_InjectiveAccountsRPC_OrderStates_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    86  	var protoReq OrderStatesRequest
    87  	var metadata runtime.ServerMetadata
    88  
    89  	newReader, berr := utilities.IOReaderFactory(req.Body)
    90  	if berr != nil {
    91  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    92  	}
    93  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    94  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    95  	}
    96  
    97  	msg, err := server.OrderStates(ctx, &protoReq)
    98  	return msg, metadata, err
    99  
   100  }
   101  
   102  func request_InjectiveAccountsRPC_SubaccountsList_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   103  	var protoReq SubaccountsListRequest
   104  	var metadata runtime.ServerMetadata
   105  
   106  	newReader, berr := utilities.IOReaderFactory(req.Body)
   107  	if berr != nil {
   108  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   109  	}
   110  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   111  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   112  	}
   113  
   114  	msg, err := client.SubaccountsList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   115  	return msg, metadata, err
   116  
   117  }
   118  
   119  func local_request_InjectiveAccountsRPC_SubaccountsList_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   120  	var protoReq SubaccountsListRequest
   121  	var metadata runtime.ServerMetadata
   122  
   123  	newReader, berr := utilities.IOReaderFactory(req.Body)
   124  	if berr != nil {
   125  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   126  	}
   127  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   128  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   129  	}
   130  
   131  	msg, err := server.SubaccountsList(ctx, &protoReq)
   132  	return msg, metadata, err
   133  
   134  }
   135  
   136  func request_InjectiveAccountsRPC_SubaccountBalancesList_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   137  	var protoReq SubaccountBalancesListRequest
   138  	var metadata runtime.ServerMetadata
   139  
   140  	newReader, berr := utilities.IOReaderFactory(req.Body)
   141  	if berr != nil {
   142  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   143  	}
   144  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   145  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   146  	}
   147  
   148  	msg, err := client.SubaccountBalancesList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   149  	return msg, metadata, err
   150  
   151  }
   152  
   153  func local_request_InjectiveAccountsRPC_SubaccountBalancesList_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   154  	var protoReq SubaccountBalancesListRequest
   155  	var metadata runtime.ServerMetadata
   156  
   157  	newReader, berr := utilities.IOReaderFactory(req.Body)
   158  	if berr != nil {
   159  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   160  	}
   161  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   162  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   163  	}
   164  
   165  	msg, err := server.SubaccountBalancesList(ctx, &protoReq)
   166  	return msg, metadata, err
   167  
   168  }
   169  
   170  func request_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   171  	var protoReq SubaccountBalanceEndpointRequest
   172  	var metadata runtime.ServerMetadata
   173  
   174  	newReader, berr := utilities.IOReaderFactory(req.Body)
   175  	if berr != nil {
   176  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   177  	}
   178  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   179  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   180  	}
   181  
   182  	msg, err := client.SubaccountBalanceEndpoint(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   183  	return msg, metadata, err
   184  
   185  }
   186  
   187  func local_request_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   188  	var protoReq SubaccountBalanceEndpointRequest
   189  	var metadata runtime.ServerMetadata
   190  
   191  	newReader, berr := utilities.IOReaderFactory(req.Body)
   192  	if berr != nil {
   193  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   194  	}
   195  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   196  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   197  	}
   198  
   199  	msg, err := server.SubaccountBalanceEndpoint(ctx, &protoReq)
   200  	return msg, metadata, err
   201  
   202  }
   203  
   204  func request_InjectiveAccountsRPC_StreamSubaccountBalance_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (InjectiveAccountsRPC_StreamSubaccountBalanceClient, runtime.ServerMetadata, error) {
   205  	var protoReq StreamSubaccountBalanceRequest
   206  	var metadata runtime.ServerMetadata
   207  
   208  	newReader, berr := utilities.IOReaderFactory(req.Body)
   209  	if berr != nil {
   210  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   211  	}
   212  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   213  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   214  	}
   215  
   216  	stream, err := client.StreamSubaccountBalance(ctx, &protoReq)
   217  	if err != nil {
   218  		return nil, metadata, err
   219  	}
   220  	header, err := stream.Header()
   221  	if err != nil {
   222  		return nil, metadata, err
   223  	}
   224  	metadata.HeaderMD = header
   225  	return stream, metadata, nil
   226  
   227  }
   228  
   229  func request_InjectiveAccountsRPC_SubaccountHistory_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   230  	var protoReq SubaccountHistoryRequest
   231  	var metadata runtime.ServerMetadata
   232  
   233  	newReader, berr := utilities.IOReaderFactory(req.Body)
   234  	if berr != nil {
   235  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   236  	}
   237  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   238  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   239  	}
   240  
   241  	msg, err := client.SubaccountHistory(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   242  	return msg, metadata, err
   243  
   244  }
   245  
   246  func local_request_InjectiveAccountsRPC_SubaccountHistory_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   247  	var protoReq SubaccountHistoryRequest
   248  	var metadata runtime.ServerMetadata
   249  
   250  	newReader, berr := utilities.IOReaderFactory(req.Body)
   251  	if berr != nil {
   252  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   253  	}
   254  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   255  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   256  	}
   257  
   258  	msg, err := server.SubaccountHistory(ctx, &protoReq)
   259  	return msg, metadata, err
   260  
   261  }
   262  
   263  func request_InjectiveAccountsRPC_SubaccountOrderSummary_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   264  	var protoReq SubaccountOrderSummaryRequest
   265  	var metadata runtime.ServerMetadata
   266  
   267  	newReader, berr := utilities.IOReaderFactory(req.Body)
   268  	if berr != nil {
   269  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   270  	}
   271  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   272  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   273  	}
   274  
   275  	msg, err := client.SubaccountOrderSummary(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   276  	return msg, metadata, err
   277  
   278  }
   279  
   280  func local_request_InjectiveAccountsRPC_SubaccountOrderSummary_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   281  	var protoReq SubaccountOrderSummaryRequest
   282  	var metadata runtime.ServerMetadata
   283  
   284  	newReader, berr := utilities.IOReaderFactory(req.Body)
   285  	if berr != nil {
   286  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   287  	}
   288  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   289  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   290  	}
   291  
   292  	msg, err := server.SubaccountOrderSummary(ctx, &protoReq)
   293  	return msg, metadata, err
   294  
   295  }
   296  
   297  func request_InjectiveAccountsRPC_Rewards_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   298  	var protoReq RewardsRequest
   299  	var metadata runtime.ServerMetadata
   300  
   301  	newReader, berr := utilities.IOReaderFactory(req.Body)
   302  	if berr != nil {
   303  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   304  	}
   305  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   306  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   307  	}
   308  
   309  	msg, err := client.Rewards(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   310  	return msg, metadata, err
   311  
   312  }
   313  
   314  func local_request_InjectiveAccountsRPC_Rewards_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveAccountsRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   315  	var protoReq RewardsRequest
   316  	var metadata runtime.ServerMetadata
   317  
   318  	newReader, berr := utilities.IOReaderFactory(req.Body)
   319  	if berr != nil {
   320  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   321  	}
   322  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   323  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   324  	}
   325  
   326  	msg, err := server.Rewards(ctx, &protoReq)
   327  	return msg, metadata, err
   328  
   329  }
   330  
   331  func request_InjectiveAccountsRPC_StreamAccountData_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveAccountsRPCClient, req *http.Request, pathParams map[string]string) (InjectiveAccountsRPC_StreamAccountDataClient, runtime.ServerMetadata, error) {
   332  	var protoReq StreamAccountDataRequest
   333  	var metadata runtime.ServerMetadata
   334  
   335  	newReader, berr := utilities.IOReaderFactory(req.Body)
   336  	if berr != nil {
   337  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   338  	}
   339  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   340  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   341  	}
   342  
   343  	stream, err := client.StreamAccountData(ctx, &protoReq)
   344  	if err != nil {
   345  		return nil, metadata, err
   346  	}
   347  	header, err := stream.Header()
   348  	if err != nil {
   349  		return nil, metadata, err
   350  	}
   351  	metadata.HeaderMD = header
   352  	return stream, metadata, nil
   353  
   354  }
   355  
   356  // RegisterInjectiveAccountsRPCHandlerServer registers the http handlers for service InjectiveAccountsRPC to "mux".
   357  // UnaryRPC     :call InjectiveAccountsRPCServer directly.
   358  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   359  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterInjectiveAccountsRPCHandlerFromEndpoint instead.
   360  func RegisterInjectiveAccountsRPCHandlerServer(ctx context.Context, mux *runtime.ServeMux, server InjectiveAccountsRPCServer) error {
   361  
   362  	mux.Handle("POST", pattern_InjectiveAccountsRPC_Portfolio_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   363  		ctx, cancel := context.WithCancel(req.Context())
   364  		defer cancel()
   365  		var stream runtime.ServerTransportStream
   366  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   367  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   368  		var err error
   369  		var annotatedContext context.Context
   370  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/Portfolio", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/Portfolio"))
   371  		if err != nil {
   372  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   373  			return
   374  		}
   375  		resp, md, err := local_request_InjectiveAccountsRPC_Portfolio_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   376  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   377  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   378  		if err != nil {
   379  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   380  			return
   381  		}
   382  
   383  		forward_InjectiveAccountsRPC_Portfolio_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   384  
   385  	})
   386  
   387  	mux.Handle("POST", pattern_InjectiveAccountsRPC_OrderStates_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   388  		ctx, cancel := context.WithCancel(req.Context())
   389  		defer cancel()
   390  		var stream runtime.ServerTransportStream
   391  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   392  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   393  		var err error
   394  		var annotatedContext context.Context
   395  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/OrderStates", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/OrderStates"))
   396  		if err != nil {
   397  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   398  			return
   399  		}
   400  		resp, md, err := local_request_InjectiveAccountsRPC_OrderStates_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   401  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   402  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   403  		if err != nil {
   404  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   405  			return
   406  		}
   407  
   408  		forward_InjectiveAccountsRPC_OrderStates_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   409  
   410  	})
   411  
   412  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountsList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   413  		ctx, cancel := context.WithCancel(req.Context())
   414  		defer cancel()
   415  		var stream runtime.ServerTransportStream
   416  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   417  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   418  		var err error
   419  		var annotatedContext context.Context
   420  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountsList", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountsList"))
   421  		if err != nil {
   422  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   423  			return
   424  		}
   425  		resp, md, err := local_request_InjectiveAccountsRPC_SubaccountsList_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   426  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   427  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   428  		if err != nil {
   429  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   430  			return
   431  		}
   432  
   433  		forward_InjectiveAccountsRPC_SubaccountsList_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   434  
   435  	})
   436  
   437  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountBalancesList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   438  		ctx, cancel := context.WithCancel(req.Context())
   439  		defer cancel()
   440  		var stream runtime.ServerTransportStream
   441  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   442  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   443  		var err error
   444  		var annotatedContext context.Context
   445  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalancesList", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalancesList"))
   446  		if err != nil {
   447  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   448  			return
   449  		}
   450  		resp, md, err := local_request_InjectiveAccountsRPC_SubaccountBalancesList_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   451  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   452  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   453  		if err != nil {
   454  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   455  			return
   456  		}
   457  
   458  		forward_InjectiveAccountsRPC_SubaccountBalancesList_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   459  
   460  	})
   461  
   462  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   463  		ctx, cancel := context.WithCancel(req.Context())
   464  		defer cancel()
   465  		var stream runtime.ServerTransportStream
   466  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   467  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   468  		var err error
   469  		var annotatedContext context.Context
   470  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalanceEndpoint", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalanceEndpoint"))
   471  		if err != nil {
   472  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   473  			return
   474  		}
   475  		resp, md, err := local_request_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   476  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   477  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   478  		if err != nil {
   479  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   480  			return
   481  		}
   482  
   483  		forward_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   484  
   485  	})
   486  
   487  	mux.Handle("POST", pattern_InjectiveAccountsRPC_StreamSubaccountBalance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   488  		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
   489  		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   490  		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   491  		return
   492  	})
   493  
   494  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountHistory_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   495  		ctx, cancel := context.WithCancel(req.Context())
   496  		defer cancel()
   497  		var stream runtime.ServerTransportStream
   498  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   499  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   500  		var err error
   501  		var annotatedContext context.Context
   502  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountHistory", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountHistory"))
   503  		if err != nil {
   504  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   505  			return
   506  		}
   507  		resp, md, err := local_request_InjectiveAccountsRPC_SubaccountHistory_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   508  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   509  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   510  		if err != nil {
   511  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   512  			return
   513  		}
   514  
   515  		forward_InjectiveAccountsRPC_SubaccountHistory_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   516  
   517  	})
   518  
   519  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountOrderSummary_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   520  		ctx, cancel := context.WithCancel(req.Context())
   521  		defer cancel()
   522  		var stream runtime.ServerTransportStream
   523  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   524  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   525  		var err error
   526  		var annotatedContext context.Context
   527  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountOrderSummary", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountOrderSummary"))
   528  		if err != nil {
   529  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   530  			return
   531  		}
   532  		resp, md, err := local_request_InjectiveAccountsRPC_SubaccountOrderSummary_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   533  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   534  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   535  		if err != nil {
   536  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   537  			return
   538  		}
   539  
   540  		forward_InjectiveAccountsRPC_SubaccountOrderSummary_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   541  
   542  	})
   543  
   544  	mux.Handle("POST", pattern_InjectiveAccountsRPC_Rewards_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   545  		ctx, cancel := context.WithCancel(req.Context())
   546  		defer cancel()
   547  		var stream runtime.ServerTransportStream
   548  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   549  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   550  		var err error
   551  		var annotatedContext context.Context
   552  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/Rewards", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/Rewards"))
   553  		if err != nil {
   554  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   555  			return
   556  		}
   557  		resp, md, err := local_request_InjectiveAccountsRPC_Rewards_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   558  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   559  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   560  		if err != nil {
   561  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   562  			return
   563  		}
   564  
   565  		forward_InjectiveAccountsRPC_Rewards_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   566  
   567  	})
   568  
   569  	mux.Handle("POST", pattern_InjectiveAccountsRPC_StreamAccountData_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   570  		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
   571  		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   572  		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   573  		return
   574  	})
   575  
   576  	return nil
   577  }
   578  
   579  // RegisterInjectiveAccountsRPCHandlerFromEndpoint is same as RegisterInjectiveAccountsRPCHandler but
   580  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   581  func RegisterInjectiveAccountsRPCHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   582  	conn, err := grpc.Dial(endpoint, opts...)
   583  	if err != nil {
   584  		return err
   585  	}
   586  	defer func() {
   587  		if err != nil {
   588  			if cerr := conn.Close(); cerr != nil {
   589  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   590  			}
   591  			return
   592  		}
   593  		go func() {
   594  			<-ctx.Done()
   595  			if cerr := conn.Close(); cerr != nil {
   596  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   597  			}
   598  		}()
   599  	}()
   600  
   601  	return RegisterInjectiveAccountsRPCHandler(ctx, mux, conn)
   602  }
   603  
   604  // RegisterInjectiveAccountsRPCHandler registers the http handlers for service InjectiveAccountsRPC to "mux".
   605  // The handlers forward requests to the grpc endpoint over "conn".
   606  func RegisterInjectiveAccountsRPCHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   607  	return RegisterInjectiveAccountsRPCHandlerClient(ctx, mux, NewInjectiveAccountsRPCClient(conn))
   608  }
   609  
   610  // RegisterInjectiveAccountsRPCHandlerClient registers the http handlers for service InjectiveAccountsRPC
   611  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "InjectiveAccountsRPCClient".
   612  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "InjectiveAccountsRPCClient"
   613  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   614  // "InjectiveAccountsRPCClient" to call the correct interceptors.
   615  func RegisterInjectiveAccountsRPCHandlerClient(ctx context.Context, mux *runtime.ServeMux, client InjectiveAccountsRPCClient) error {
   616  
   617  	mux.Handle("POST", pattern_InjectiveAccountsRPC_Portfolio_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   618  		ctx, cancel := context.WithCancel(req.Context())
   619  		defer cancel()
   620  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   621  		var err error
   622  		var annotatedContext context.Context
   623  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/Portfolio", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/Portfolio"))
   624  		if err != nil {
   625  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   626  			return
   627  		}
   628  		resp, md, err := request_InjectiveAccountsRPC_Portfolio_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   629  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   630  		if err != nil {
   631  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   632  			return
   633  		}
   634  
   635  		forward_InjectiveAccountsRPC_Portfolio_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   636  
   637  	})
   638  
   639  	mux.Handle("POST", pattern_InjectiveAccountsRPC_OrderStates_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   640  		ctx, cancel := context.WithCancel(req.Context())
   641  		defer cancel()
   642  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   643  		var err error
   644  		var annotatedContext context.Context
   645  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/OrderStates", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/OrderStates"))
   646  		if err != nil {
   647  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   648  			return
   649  		}
   650  		resp, md, err := request_InjectiveAccountsRPC_OrderStates_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   651  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   652  		if err != nil {
   653  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   654  			return
   655  		}
   656  
   657  		forward_InjectiveAccountsRPC_OrderStates_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   658  
   659  	})
   660  
   661  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountsList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   662  		ctx, cancel := context.WithCancel(req.Context())
   663  		defer cancel()
   664  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   665  		var err error
   666  		var annotatedContext context.Context
   667  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountsList", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountsList"))
   668  		if err != nil {
   669  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   670  			return
   671  		}
   672  		resp, md, err := request_InjectiveAccountsRPC_SubaccountsList_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   673  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   674  		if err != nil {
   675  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   676  			return
   677  		}
   678  
   679  		forward_InjectiveAccountsRPC_SubaccountsList_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   680  
   681  	})
   682  
   683  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountBalancesList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   684  		ctx, cancel := context.WithCancel(req.Context())
   685  		defer cancel()
   686  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   687  		var err error
   688  		var annotatedContext context.Context
   689  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalancesList", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalancesList"))
   690  		if err != nil {
   691  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   692  			return
   693  		}
   694  		resp, md, err := request_InjectiveAccountsRPC_SubaccountBalancesList_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   695  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   696  		if err != nil {
   697  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   698  			return
   699  		}
   700  
   701  		forward_InjectiveAccountsRPC_SubaccountBalancesList_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   702  
   703  	})
   704  
   705  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   706  		ctx, cancel := context.WithCancel(req.Context())
   707  		defer cancel()
   708  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   709  		var err error
   710  		var annotatedContext context.Context
   711  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalanceEndpoint", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountBalanceEndpoint"))
   712  		if err != nil {
   713  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   714  			return
   715  		}
   716  		resp, md, err := request_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   717  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   718  		if err != nil {
   719  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   720  			return
   721  		}
   722  
   723  		forward_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   724  
   725  	})
   726  
   727  	mux.Handle("POST", pattern_InjectiveAccountsRPC_StreamSubaccountBalance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   728  		ctx, cancel := context.WithCancel(req.Context())
   729  		defer cancel()
   730  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   731  		var err error
   732  		var annotatedContext context.Context
   733  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/StreamSubaccountBalance", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/StreamSubaccountBalance"))
   734  		if err != nil {
   735  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   736  			return
   737  		}
   738  		resp, md, err := request_InjectiveAccountsRPC_StreamSubaccountBalance_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   739  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   740  		if err != nil {
   741  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   742  			return
   743  		}
   744  
   745  		forward_InjectiveAccountsRPC_StreamSubaccountBalance_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
   746  
   747  	})
   748  
   749  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountHistory_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   750  		ctx, cancel := context.WithCancel(req.Context())
   751  		defer cancel()
   752  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   753  		var err error
   754  		var annotatedContext context.Context
   755  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountHistory", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountHistory"))
   756  		if err != nil {
   757  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   758  			return
   759  		}
   760  		resp, md, err := request_InjectiveAccountsRPC_SubaccountHistory_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   761  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   762  		if err != nil {
   763  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   764  			return
   765  		}
   766  
   767  		forward_InjectiveAccountsRPC_SubaccountHistory_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   768  
   769  	})
   770  
   771  	mux.Handle("POST", pattern_InjectiveAccountsRPC_SubaccountOrderSummary_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   772  		ctx, cancel := context.WithCancel(req.Context())
   773  		defer cancel()
   774  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   775  		var err error
   776  		var annotatedContext context.Context
   777  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountOrderSummary", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/SubaccountOrderSummary"))
   778  		if err != nil {
   779  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   780  			return
   781  		}
   782  		resp, md, err := request_InjectiveAccountsRPC_SubaccountOrderSummary_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   783  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   784  		if err != nil {
   785  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   786  			return
   787  		}
   788  
   789  		forward_InjectiveAccountsRPC_SubaccountOrderSummary_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   790  
   791  	})
   792  
   793  	mux.Handle("POST", pattern_InjectiveAccountsRPC_Rewards_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   794  		ctx, cancel := context.WithCancel(req.Context())
   795  		defer cancel()
   796  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   797  		var err error
   798  		var annotatedContext context.Context
   799  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/Rewards", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/Rewards"))
   800  		if err != nil {
   801  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   802  			return
   803  		}
   804  		resp, md, err := request_InjectiveAccountsRPC_Rewards_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   805  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   806  		if err != nil {
   807  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   808  			return
   809  		}
   810  
   811  		forward_InjectiveAccountsRPC_Rewards_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   812  
   813  	})
   814  
   815  	mux.Handle("POST", pattern_InjectiveAccountsRPC_StreamAccountData_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   816  		ctx, cancel := context.WithCancel(req.Context())
   817  		defer cancel()
   818  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   819  		var err error
   820  		var annotatedContext context.Context
   821  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_accounts_rpc.InjectiveAccountsRPC/StreamAccountData", runtime.WithHTTPPathPattern("/injective_accounts_rpc.InjectiveAccountsRPC/StreamAccountData"))
   822  		if err != nil {
   823  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   824  			return
   825  		}
   826  		resp, md, err := request_InjectiveAccountsRPC_StreamAccountData_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   827  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   828  		if err != nil {
   829  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   830  			return
   831  		}
   832  
   833  		forward_InjectiveAccountsRPC_StreamAccountData_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
   834  
   835  	})
   836  
   837  	return nil
   838  }
   839  
   840  var (
   841  	pattern_InjectiveAccountsRPC_Portfolio_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "Portfolio"}, ""))
   842  
   843  	pattern_InjectiveAccountsRPC_OrderStates_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "OrderStates"}, ""))
   844  
   845  	pattern_InjectiveAccountsRPC_SubaccountsList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "SubaccountsList"}, ""))
   846  
   847  	pattern_InjectiveAccountsRPC_SubaccountBalancesList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "SubaccountBalancesList"}, ""))
   848  
   849  	pattern_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "SubaccountBalanceEndpoint"}, ""))
   850  
   851  	pattern_InjectiveAccountsRPC_StreamSubaccountBalance_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "StreamSubaccountBalance"}, ""))
   852  
   853  	pattern_InjectiveAccountsRPC_SubaccountHistory_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "SubaccountHistory"}, ""))
   854  
   855  	pattern_InjectiveAccountsRPC_SubaccountOrderSummary_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "SubaccountOrderSummary"}, ""))
   856  
   857  	pattern_InjectiveAccountsRPC_Rewards_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "Rewards"}, ""))
   858  
   859  	pattern_InjectiveAccountsRPC_StreamAccountData_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_accounts_rpc.InjectiveAccountsRPC", "StreamAccountData"}, ""))
   860  )
   861  
   862  var (
   863  	forward_InjectiveAccountsRPC_Portfolio_0 = runtime.ForwardResponseMessage
   864  
   865  	forward_InjectiveAccountsRPC_OrderStates_0 = runtime.ForwardResponseMessage
   866  
   867  	forward_InjectiveAccountsRPC_SubaccountsList_0 = runtime.ForwardResponseMessage
   868  
   869  	forward_InjectiveAccountsRPC_SubaccountBalancesList_0 = runtime.ForwardResponseMessage
   870  
   871  	forward_InjectiveAccountsRPC_SubaccountBalanceEndpoint_0 = runtime.ForwardResponseMessage
   872  
   873  	forward_InjectiveAccountsRPC_StreamSubaccountBalance_0 = runtime.ForwardResponseStream
   874  
   875  	forward_InjectiveAccountsRPC_SubaccountHistory_0 = runtime.ForwardResponseMessage
   876  
   877  	forward_InjectiveAccountsRPC_SubaccountOrderSummary_0 = runtime.ForwardResponseMessage
   878  
   879  	forward_InjectiveAccountsRPC_Rewards_0 = runtime.ForwardResponseMessage
   880  
   881  	forward_InjectiveAccountsRPC_StreamAccountData_0 = runtime.ForwardResponseStream
   882  )