github.com/InjectiveLabs/sdk-go@v1.53.0/exchange/insurance_rpc/pb/injective_insurance_rpc.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: injective_insurance_rpc.proto
     3  
     4  /*
     5  Package injective_insurance_rpcpb is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package injective_insurance_rpcpb
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    17  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    18  	"google.golang.org/grpc"
    19  	"google.golang.org/grpc/codes"
    20  	"google.golang.org/grpc/grpclog"
    21  	"google.golang.org/grpc/metadata"
    22  	"google.golang.org/grpc/status"
    23  	"google.golang.org/protobuf/proto"
    24  )
    25  
    26  // Suppress "imported and not used" errors
    27  var _ codes.Code
    28  var _ io.Reader
    29  var _ status.Status
    30  var _ = runtime.String
    31  var _ = utilities.NewDoubleArray
    32  var _ = metadata.Join
    33  
    34  func request_InjectiveInsuranceRPC_Funds_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveInsuranceRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    35  	var protoReq FundsRequest
    36  	var metadata runtime.ServerMetadata
    37  
    38  	newReader, berr := utilities.IOReaderFactory(req.Body)
    39  	if berr != nil {
    40  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    41  	}
    42  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    43  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    44  	}
    45  
    46  	msg, err := client.Funds(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    47  	return msg, metadata, err
    48  
    49  }
    50  
    51  func local_request_InjectiveInsuranceRPC_Funds_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveInsuranceRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    52  	var protoReq FundsRequest
    53  	var metadata runtime.ServerMetadata
    54  
    55  	newReader, berr := utilities.IOReaderFactory(req.Body)
    56  	if berr != nil {
    57  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    58  	}
    59  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    60  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    61  	}
    62  
    63  	msg, err := server.Funds(ctx, &protoReq)
    64  	return msg, metadata, err
    65  
    66  }
    67  
    68  func request_InjectiveInsuranceRPC_Fund_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveInsuranceRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    69  	var protoReq FundRequest
    70  	var metadata runtime.ServerMetadata
    71  
    72  	newReader, berr := utilities.IOReaderFactory(req.Body)
    73  	if berr != nil {
    74  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    75  	}
    76  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    77  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    78  	}
    79  
    80  	msg, err := client.Fund(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    81  	return msg, metadata, err
    82  
    83  }
    84  
    85  func local_request_InjectiveInsuranceRPC_Fund_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveInsuranceRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    86  	var protoReq FundRequest
    87  	var metadata runtime.ServerMetadata
    88  
    89  	newReader, berr := utilities.IOReaderFactory(req.Body)
    90  	if berr != nil {
    91  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    92  	}
    93  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    94  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    95  	}
    96  
    97  	msg, err := server.Fund(ctx, &protoReq)
    98  	return msg, metadata, err
    99  
   100  }
   101  
   102  func request_InjectiveInsuranceRPC_Redemptions_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveInsuranceRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   103  	var protoReq RedemptionsRequest
   104  	var metadata runtime.ServerMetadata
   105  
   106  	newReader, berr := utilities.IOReaderFactory(req.Body)
   107  	if berr != nil {
   108  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   109  	}
   110  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   111  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   112  	}
   113  
   114  	msg, err := client.Redemptions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   115  	return msg, metadata, err
   116  
   117  }
   118  
   119  func local_request_InjectiveInsuranceRPC_Redemptions_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveInsuranceRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   120  	var protoReq RedemptionsRequest
   121  	var metadata runtime.ServerMetadata
   122  
   123  	newReader, berr := utilities.IOReaderFactory(req.Body)
   124  	if berr != nil {
   125  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   126  	}
   127  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   128  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   129  	}
   130  
   131  	msg, err := server.Redemptions(ctx, &protoReq)
   132  	return msg, metadata, err
   133  
   134  }
   135  
   136  // RegisterInjectiveInsuranceRPCHandlerServer registers the http handlers for service InjectiveInsuranceRPC to "mux".
   137  // UnaryRPC     :call InjectiveInsuranceRPCServer directly.
   138  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   139  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterInjectiveInsuranceRPCHandlerFromEndpoint instead.
   140  func RegisterInjectiveInsuranceRPCHandlerServer(ctx context.Context, mux *runtime.ServeMux, server InjectiveInsuranceRPCServer) error {
   141  
   142  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Funds_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   143  		ctx, cancel := context.WithCancel(req.Context())
   144  		defer cancel()
   145  		var stream runtime.ServerTransportStream
   146  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   147  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   148  		var err error
   149  		var annotatedContext context.Context
   150  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Funds", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Funds"))
   151  		if err != nil {
   152  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   153  			return
   154  		}
   155  		resp, md, err := local_request_InjectiveInsuranceRPC_Funds_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   156  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   157  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   158  		if err != nil {
   159  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   160  			return
   161  		}
   162  
   163  		forward_InjectiveInsuranceRPC_Funds_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   164  
   165  	})
   166  
   167  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Fund_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   168  		ctx, cancel := context.WithCancel(req.Context())
   169  		defer cancel()
   170  		var stream runtime.ServerTransportStream
   171  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   172  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   173  		var err error
   174  		var annotatedContext context.Context
   175  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Fund", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Fund"))
   176  		if err != nil {
   177  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   178  			return
   179  		}
   180  		resp, md, err := local_request_InjectiveInsuranceRPC_Fund_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   181  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   182  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   183  		if err != nil {
   184  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   185  			return
   186  		}
   187  
   188  		forward_InjectiveInsuranceRPC_Fund_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   189  
   190  	})
   191  
   192  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Redemptions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   193  		ctx, cancel := context.WithCancel(req.Context())
   194  		defer cancel()
   195  		var stream runtime.ServerTransportStream
   196  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   197  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   198  		var err error
   199  		var annotatedContext context.Context
   200  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Redemptions", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Redemptions"))
   201  		if err != nil {
   202  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   203  			return
   204  		}
   205  		resp, md, err := local_request_InjectiveInsuranceRPC_Redemptions_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   206  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   207  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   208  		if err != nil {
   209  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   210  			return
   211  		}
   212  
   213  		forward_InjectiveInsuranceRPC_Redemptions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   214  
   215  	})
   216  
   217  	return nil
   218  }
   219  
   220  // RegisterInjectiveInsuranceRPCHandlerFromEndpoint is same as RegisterInjectiveInsuranceRPCHandler but
   221  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   222  func RegisterInjectiveInsuranceRPCHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   223  	conn, err := grpc.Dial(endpoint, opts...)
   224  	if err != nil {
   225  		return err
   226  	}
   227  	defer func() {
   228  		if err != nil {
   229  			if cerr := conn.Close(); cerr != nil {
   230  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   231  			}
   232  			return
   233  		}
   234  		go func() {
   235  			<-ctx.Done()
   236  			if cerr := conn.Close(); cerr != nil {
   237  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   238  			}
   239  		}()
   240  	}()
   241  
   242  	return RegisterInjectiveInsuranceRPCHandler(ctx, mux, conn)
   243  }
   244  
   245  // RegisterInjectiveInsuranceRPCHandler registers the http handlers for service InjectiveInsuranceRPC to "mux".
   246  // The handlers forward requests to the grpc endpoint over "conn".
   247  func RegisterInjectiveInsuranceRPCHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   248  	return RegisterInjectiveInsuranceRPCHandlerClient(ctx, mux, NewInjectiveInsuranceRPCClient(conn))
   249  }
   250  
   251  // RegisterInjectiveInsuranceRPCHandlerClient registers the http handlers for service InjectiveInsuranceRPC
   252  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "InjectiveInsuranceRPCClient".
   253  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "InjectiveInsuranceRPCClient"
   254  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   255  // "InjectiveInsuranceRPCClient" to call the correct interceptors.
   256  func RegisterInjectiveInsuranceRPCHandlerClient(ctx context.Context, mux *runtime.ServeMux, client InjectiveInsuranceRPCClient) error {
   257  
   258  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Funds_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   259  		ctx, cancel := context.WithCancel(req.Context())
   260  		defer cancel()
   261  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   262  		var err error
   263  		var annotatedContext context.Context
   264  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Funds", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Funds"))
   265  		if err != nil {
   266  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   267  			return
   268  		}
   269  		resp, md, err := request_InjectiveInsuranceRPC_Funds_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   270  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   271  		if err != nil {
   272  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   273  			return
   274  		}
   275  
   276  		forward_InjectiveInsuranceRPC_Funds_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   277  
   278  	})
   279  
   280  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Fund_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   281  		ctx, cancel := context.WithCancel(req.Context())
   282  		defer cancel()
   283  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   284  		var err error
   285  		var annotatedContext context.Context
   286  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Fund", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Fund"))
   287  		if err != nil {
   288  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   289  			return
   290  		}
   291  		resp, md, err := request_InjectiveInsuranceRPC_Fund_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   292  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   293  		if err != nil {
   294  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   295  			return
   296  		}
   297  
   298  		forward_InjectiveInsuranceRPC_Fund_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   299  
   300  	})
   301  
   302  	mux.Handle("POST", pattern_InjectiveInsuranceRPC_Redemptions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   303  		ctx, cancel := context.WithCancel(req.Context())
   304  		defer cancel()
   305  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   306  		var err error
   307  		var annotatedContext context.Context
   308  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_insurance_rpc.InjectiveInsuranceRPC/Redemptions", runtime.WithHTTPPathPattern("/injective_insurance_rpc.InjectiveInsuranceRPC/Redemptions"))
   309  		if err != nil {
   310  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   311  			return
   312  		}
   313  		resp, md, err := request_InjectiveInsuranceRPC_Redemptions_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   314  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   315  		if err != nil {
   316  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   317  			return
   318  		}
   319  
   320  		forward_InjectiveInsuranceRPC_Redemptions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   321  
   322  	})
   323  
   324  	return nil
   325  }
   326  
   327  var (
   328  	pattern_InjectiveInsuranceRPC_Funds_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_insurance_rpc.InjectiveInsuranceRPC", "Funds"}, ""))
   329  
   330  	pattern_InjectiveInsuranceRPC_Fund_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_insurance_rpc.InjectiveInsuranceRPC", "Fund"}, ""))
   331  
   332  	pattern_InjectiveInsuranceRPC_Redemptions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_insurance_rpc.InjectiveInsuranceRPC", "Redemptions"}, ""))
   333  )
   334  
   335  var (
   336  	forward_InjectiveInsuranceRPC_Funds_0 = runtime.ForwardResponseMessage
   337  
   338  	forward_InjectiveInsuranceRPC_Fund_0 = runtime.ForwardResponseMessage
   339  
   340  	forward_InjectiveInsuranceRPC_Redemptions_0 = runtime.ForwardResponseMessage
   341  )