github.com/InjectiveLabs/sdk-go@v1.53.0/exchange/meta_rpc/pb/injective_meta_rpc.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: injective_meta_rpc.proto 3 4 /* 5 Package injective_meta_rpcpb is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package injective_meta_rpcpb 10 11 import ( 12 "context" 13 "io" 14 "net/http" 15 16 "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" 17 "github.com/grpc-ecosystem/grpc-gateway/v2/utilities" 18 "google.golang.org/grpc" 19 "google.golang.org/grpc/codes" 20 "google.golang.org/grpc/grpclog" 21 "google.golang.org/grpc/metadata" 22 "google.golang.org/grpc/status" 23 "google.golang.org/protobuf/proto" 24 ) 25 26 // Suppress "imported and not used" errors 27 var _ codes.Code 28 var _ io.Reader 29 var _ status.Status 30 var _ = runtime.String 31 var _ = utilities.NewDoubleArray 32 var _ = metadata.Join 33 34 func request_InjectiveMetaRPC_Ping_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 35 var protoReq PingRequest 36 var metadata runtime.ServerMetadata 37 38 newReader, berr := utilities.IOReaderFactory(req.Body) 39 if berr != nil { 40 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 41 } 42 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 43 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 44 } 45 46 msg, err := client.Ping(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 47 return msg, metadata, err 48 49 } 50 51 func local_request_InjectiveMetaRPC_Ping_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 52 var protoReq PingRequest 53 var metadata runtime.ServerMetadata 54 55 newReader, berr := utilities.IOReaderFactory(req.Body) 56 if berr != nil { 57 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 58 } 59 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 60 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 61 } 62 63 msg, err := server.Ping(ctx, &protoReq) 64 return msg, metadata, err 65 66 } 67 68 func request_InjectiveMetaRPC_Version_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 69 var protoReq VersionRequest 70 var metadata runtime.ServerMetadata 71 72 newReader, berr := utilities.IOReaderFactory(req.Body) 73 if berr != nil { 74 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 75 } 76 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 77 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 78 } 79 80 msg, err := client.Version(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 81 return msg, metadata, err 82 83 } 84 85 func local_request_InjectiveMetaRPC_Version_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 86 var protoReq VersionRequest 87 var metadata runtime.ServerMetadata 88 89 newReader, berr := utilities.IOReaderFactory(req.Body) 90 if berr != nil { 91 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 92 } 93 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 94 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 95 } 96 97 msg, err := server.Version(ctx, &protoReq) 98 return msg, metadata, err 99 100 } 101 102 func request_InjectiveMetaRPC_Info_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 103 var protoReq InfoRequest 104 var metadata runtime.ServerMetadata 105 106 newReader, berr := utilities.IOReaderFactory(req.Body) 107 if berr != nil { 108 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 109 } 110 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 111 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 112 } 113 114 msg, err := client.Info(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 115 return msg, metadata, err 116 117 } 118 119 func local_request_InjectiveMetaRPC_Info_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 120 var protoReq InfoRequest 121 var metadata runtime.ServerMetadata 122 123 newReader, berr := utilities.IOReaderFactory(req.Body) 124 if berr != nil { 125 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 126 } 127 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 128 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 129 } 130 131 msg, err := server.Info(ctx, &protoReq) 132 return msg, metadata, err 133 134 } 135 136 func request_InjectiveMetaRPC_StreamKeepalive_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (InjectiveMetaRPC_StreamKeepaliveClient, runtime.ServerMetadata, error) { 137 var protoReq StreamKeepaliveRequest 138 var metadata runtime.ServerMetadata 139 140 newReader, berr := utilities.IOReaderFactory(req.Body) 141 if berr != nil { 142 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 143 } 144 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 145 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 146 } 147 148 stream, err := client.StreamKeepalive(ctx, &protoReq) 149 if err != nil { 150 return nil, metadata, err 151 } 152 header, err := stream.Header() 153 if err != nil { 154 return nil, metadata, err 155 } 156 metadata.HeaderMD = header 157 return stream, metadata, nil 158 159 } 160 161 func request_InjectiveMetaRPC_TokenMetadata_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 162 var protoReq TokenMetadataRequest 163 var metadata runtime.ServerMetadata 164 165 newReader, berr := utilities.IOReaderFactory(req.Body) 166 if berr != nil { 167 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 168 } 169 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 170 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 171 } 172 173 msg, err := client.TokenMetadata(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 174 return msg, metadata, err 175 176 } 177 178 func local_request_InjectiveMetaRPC_TokenMetadata_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 179 var protoReq TokenMetadataRequest 180 var metadata runtime.ServerMetadata 181 182 newReader, berr := utilities.IOReaderFactory(req.Body) 183 if berr != nil { 184 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 185 } 186 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 187 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 188 } 189 190 msg, err := server.TokenMetadata(ctx, &protoReq) 191 return msg, metadata, err 192 193 } 194 195 // RegisterInjectiveMetaRPCHandlerServer registers the http handlers for service InjectiveMetaRPC to "mux". 196 // UnaryRPC :call InjectiveMetaRPCServer directly. 197 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 198 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterInjectiveMetaRPCHandlerFromEndpoint instead. 199 func RegisterInjectiveMetaRPCHandlerServer(ctx context.Context, mux *runtime.ServeMux, server InjectiveMetaRPCServer) error { 200 201 mux.Handle("POST", pattern_InjectiveMetaRPC_Ping_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 202 ctx, cancel := context.WithCancel(req.Context()) 203 defer cancel() 204 var stream runtime.ServerTransportStream 205 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 206 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 207 var err error 208 var annotatedContext context.Context 209 annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Ping", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Ping")) 210 if err != nil { 211 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 212 return 213 } 214 resp, md, err := local_request_InjectiveMetaRPC_Ping_0(annotatedContext, inboundMarshaler, server, req, pathParams) 215 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 216 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 217 if err != nil { 218 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 219 return 220 } 221 222 forward_InjectiveMetaRPC_Ping_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 223 224 }) 225 226 mux.Handle("POST", pattern_InjectiveMetaRPC_Version_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 227 ctx, cancel := context.WithCancel(req.Context()) 228 defer cancel() 229 var stream runtime.ServerTransportStream 230 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 231 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 232 var err error 233 var annotatedContext context.Context 234 annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Version", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Version")) 235 if err != nil { 236 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 237 return 238 } 239 resp, md, err := local_request_InjectiveMetaRPC_Version_0(annotatedContext, inboundMarshaler, server, req, pathParams) 240 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 241 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 242 if err != nil { 243 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 244 return 245 } 246 247 forward_InjectiveMetaRPC_Version_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 248 249 }) 250 251 mux.Handle("POST", pattern_InjectiveMetaRPC_Info_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 252 ctx, cancel := context.WithCancel(req.Context()) 253 defer cancel() 254 var stream runtime.ServerTransportStream 255 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 256 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 257 var err error 258 var annotatedContext context.Context 259 annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Info", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Info")) 260 if err != nil { 261 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 262 return 263 } 264 resp, md, err := local_request_InjectiveMetaRPC_Info_0(annotatedContext, inboundMarshaler, server, req, pathParams) 265 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 266 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 267 if err != nil { 268 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 269 return 270 } 271 272 forward_InjectiveMetaRPC_Info_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 273 274 }) 275 276 mux.Handle("POST", pattern_InjectiveMetaRPC_StreamKeepalive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 277 err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport") 278 _, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 279 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 280 return 281 }) 282 283 mux.Handle("POST", pattern_InjectiveMetaRPC_TokenMetadata_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 284 ctx, cancel := context.WithCancel(req.Context()) 285 defer cancel() 286 var stream runtime.ServerTransportStream 287 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 288 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 289 var err error 290 var annotatedContext context.Context 291 annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata")) 292 if err != nil { 293 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 294 return 295 } 296 resp, md, err := local_request_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, inboundMarshaler, server, req, pathParams) 297 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 298 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 299 if err != nil { 300 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 301 return 302 } 303 304 forward_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 305 306 }) 307 308 return nil 309 } 310 311 // RegisterInjectiveMetaRPCHandlerFromEndpoint is same as RegisterInjectiveMetaRPCHandler but 312 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 313 func RegisterInjectiveMetaRPCHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 314 conn, err := grpc.Dial(endpoint, opts...) 315 if err != nil { 316 return err 317 } 318 defer func() { 319 if err != nil { 320 if cerr := conn.Close(); cerr != nil { 321 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 322 } 323 return 324 } 325 go func() { 326 <-ctx.Done() 327 if cerr := conn.Close(); cerr != nil { 328 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 329 } 330 }() 331 }() 332 333 return RegisterInjectiveMetaRPCHandler(ctx, mux, conn) 334 } 335 336 // RegisterInjectiveMetaRPCHandler registers the http handlers for service InjectiveMetaRPC to "mux". 337 // The handlers forward requests to the grpc endpoint over "conn". 338 func RegisterInjectiveMetaRPCHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 339 return RegisterInjectiveMetaRPCHandlerClient(ctx, mux, NewInjectiveMetaRPCClient(conn)) 340 } 341 342 // RegisterInjectiveMetaRPCHandlerClient registers the http handlers for service InjectiveMetaRPC 343 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "InjectiveMetaRPCClient". 344 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "InjectiveMetaRPCClient" 345 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 346 // "InjectiveMetaRPCClient" to call the correct interceptors. 347 func RegisterInjectiveMetaRPCHandlerClient(ctx context.Context, mux *runtime.ServeMux, client InjectiveMetaRPCClient) error { 348 349 mux.Handle("POST", pattern_InjectiveMetaRPC_Ping_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 350 ctx, cancel := context.WithCancel(req.Context()) 351 defer cancel() 352 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 353 var err error 354 var annotatedContext context.Context 355 annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Ping", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Ping")) 356 if err != nil { 357 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 358 return 359 } 360 resp, md, err := request_InjectiveMetaRPC_Ping_0(annotatedContext, inboundMarshaler, client, req, pathParams) 361 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 362 if err != nil { 363 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 364 return 365 } 366 367 forward_InjectiveMetaRPC_Ping_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 368 369 }) 370 371 mux.Handle("POST", pattern_InjectiveMetaRPC_Version_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 372 ctx, cancel := context.WithCancel(req.Context()) 373 defer cancel() 374 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 375 var err error 376 var annotatedContext context.Context 377 annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Version", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Version")) 378 if err != nil { 379 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 380 return 381 } 382 resp, md, err := request_InjectiveMetaRPC_Version_0(annotatedContext, inboundMarshaler, client, req, pathParams) 383 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 384 if err != nil { 385 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 386 return 387 } 388 389 forward_InjectiveMetaRPC_Version_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 390 391 }) 392 393 mux.Handle("POST", pattern_InjectiveMetaRPC_Info_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 394 ctx, cancel := context.WithCancel(req.Context()) 395 defer cancel() 396 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 397 var err error 398 var annotatedContext context.Context 399 annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Info", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Info")) 400 if err != nil { 401 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 402 return 403 } 404 resp, md, err := request_InjectiveMetaRPC_Info_0(annotatedContext, inboundMarshaler, client, req, pathParams) 405 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 406 if err != nil { 407 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 408 return 409 } 410 411 forward_InjectiveMetaRPC_Info_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 412 413 }) 414 415 mux.Handle("POST", pattern_InjectiveMetaRPC_StreamKeepalive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 416 ctx, cancel := context.WithCancel(req.Context()) 417 defer cancel() 418 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 419 var err error 420 var annotatedContext context.Context 421 annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/StreamKeepalive", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/StreamKeepalive")) 422 if err != nil { 423 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 424 return 425 } 426 resp, md, err := request_InjectiveMetaRPC_StreamKeepalive_0(annotatedContext, inboundMarshaler, client, req, pathParams) 427 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 428 if err != nil { 429 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 430 return 431 } 432 433 forward_InjectiveMetaRPC_StreamKeepalive_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 434 435 }) 436 437 mux.Handle("POST", pattern_InjectiveMetaRPC_TokenMetadata_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 438 ctx, cancel := context.WithCancel(req.Context()) 439 defer cancel() 440 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 441 var err error 442 var annotatedContext context.Context 443 annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata")) 444 if err != nil { 445 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 446 return 447 } 448 resp, md, err := request_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, inboundMarshaler, client, req, pathParams) 449 annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) 450 if err != nil { 451 runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) 452 return 453 } 454 455 forward_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 456 457 }) 458 459 return nil 460 } 461 462 var ( 463 pattern_InjectiveMetaRPC_Ping_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Ping"}, "")) 464 465 pattern_InjectiveMetaRPC_Version_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Version"}, "")) 466 467 pattern_InjectiveMetaRPC_Info_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Info"}, "")) 468 469 pattern_InjectiveMetaRPC_StreamKeepalive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "StreamKeepalive"}, "")) 470 471 pattern_InjectiveMetaRPC_TokenMetadata_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "TokenMetadata"}, "")) 472 ) 473 474 var ( 475 forward_InjectiveMetaRPC_Ping_0 = runtime.ForwardResponseMessage 476 477 forward_InjectiveMetaRPC_Version_0 = runtime.ForwardResponseMessage 478 479 forward_InjectiveMetaRPC_Info_0 = runtime.ForwardResponseMessage 480 481 forward_InjectiveMetaRPC_StreamKeepalive_0 = runtime.ForwardResponseStream 482 483 forward_InjectiveMetaRPC_TokenMetadata_0 = runtime.ForwardResponseMessage 484 )