github.com/InjectiveLabs/sdk-go@v1.53.0/exchange/meta_rpc/pb/injective_meta_rpc.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: injective_meta_rpc.proto
     3  
     4  /*
     5  Package injective_meta_rpcpb is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package injective_meta_rpcpb
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    17  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    18  	"google.golang.org/grpc"
    19  	"google.golang.org/grpc/codes"
    20  	"google.golang.org/grpc/grpclog"
    21  	"google.golang.org/grpc/metadata"
    22  	"google.golang.org/grpc/status"
    23  	"google.golang.org/protobuf/proto"
    24  )
    25  
    26  // Suppress "imported and not used" errors
    27  var _ codes.Code
    28  var _ io.Reader
    29  var _ status.Status
    30  var _ = runtime.String
    31  var _ = utilities.NewDoubleArray
    32  var _ = metadata.Join
    33  
    34  func request_InjectiveMetaRPC_Ping_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    35  	var protoReq PingRequest
    36  	var metadata runtime.ServerMetadata
    37  
    38  	newReader, berr := utilities.IOReaderFactory(req.Body)
    39  	if berr != nil {
    40  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    41  	}
    42  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    43  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    44  	}
    45  
    46  	msg, err := client.Ping(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    47  	return msg, metadata, err
    48  
    49  }
    50  
    51  func local_request_InjectiveMetaRPC_Ping_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    52  	var protoReq PingRequest
    53  	var metadata runtime.ServerMetadata
    54  
    55  	newReader, berr := utilities.IOReaderFactory(req.Body)
    56  	if berr != nil {
    57  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    58  	}
    59  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    60  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    61  	}
    62  
    63  	msg, err := server.Ping(ctx, &protoReq)
    64  	return msg, metadata, err
    65  
    66  }
    67  
    68  func request_InjectiveMetaRPC_Version_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    69  	var protoReq VersionRequest
    70  	var metadata runtime.ServerMetadata
    71  
    72  	newReader, berr := utilities.IOReaderFactory(req.Body)
    73  	if berr != nil {
    74  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    75  	}
    76  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    77  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    78  	}
    79  
    80  	msg, err := client.Version(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    81  	return msg, metadata, err
    82  
    83  }
    84  
    85  func local_request_InjectiveMetaRPC_Version_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    86  	var protoReq VersionRequest
    87  	var metadata runtime.ServerMetadata
    88  
    89  	newReader, berr := utilities.IOReaderFactory(req.Body)
    90  	if berr != nil {
    91  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    92  	}
    93  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    94  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    95  	}
    96  
    97  	msg, err := server.Version(ctx, &protoReq)
    98  	return msg, metadata, err
    99  
   100  }
   101  
   102  func request_InjectiveMetaRPC_Info_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   103  	var protoReq InfoRequest
   104  	var metadata runtime.ServerMetadata
   105  
   106  	newReader, berr := utilities.IOReaderFactory(req.Body)
   107  	if berr != nil {
   108  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   109  	}
   110  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   111  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   112  	}
   113  
   114  	msg, err := client.Info(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   115  	return msg, metadata, err
   116  
   117  }
   118  
   119  func local_request_InjectiveMetaRPC_Info_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   120  	var protoReq InfoRequest
   121  	var metadata runtime.ServerMetadata
   122  
   123  	newReader, berr := utilities.IOReaderFactory(req.Body)
   124  	if berr != nil {
   125  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   126  	}
   127  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   128  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   129  	}
   130  
   131  	msg, err := server.Info(ctx, &protoReq)
   132  	return msg, metadata, err
   133  
   134  }
   135  
   136  func request_InjectiveMetaRPC_StreamKeepalive_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (InjectiveMetaRPC_StreamKeepaliveClient, runtime.ServerMetadata, error) {
   137  	var protoReq StreamKeepaliveRequest
   138  	var metadata runtime.ServerMetadata
   139  
   140  	newReader, berr := utilities.IOReaderFactory(req.Body)
   141  	if berr != nil {
   142  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   143  	}
   144  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   145  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   146  	}
   147  
   148  	stream, err := client.StreamKeepalive(ctx, &protoReq)
   149  	if err != nil {
   150  		return nil, metadata, err
   151  	}
   152  	header, err := stream.Header()
   153  	if err != nil {
   154  		return nil, metadata, err
   155  	}
   156  	metadata.HeaderMD = header
   157  	return stream, metadata, nil
   158  
   159  }
   160  
   161  func request_InjectiveMetaRPC_TokenMetadata_0(ctx context.Context, marshaler runtime.Marshaler, client InjectiveMetaRPCClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   162  	var protoReq TokenMetadataRequest
   163  	var metadata runtime.ServerMetadata
   164  
   165  	newReader, berr := utilities.IOReaderFactory(req.Body)
   166  	if berr != nil {
   167  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   168  	}
   169  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   170  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   171  	}
   172  
   173  	msg, err := client.TokenMetadata(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   174  	return msg, metadata, err
   175  
   176  }
   177  
   178  func local_request_InjectiveMetaRPC_TokenMetadata_0(ctx context.Context, marshaler runtime.Marshaler, server InjectiveMetaRPCServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   179  	var protoReq TokenMetadataRequest
   180  	var metadata runtime.ServerMetadata
   181  
   182  	newReader, berr := utilities.IOReaderFactory(req.Body)
   183  	if berr != nil {
   184  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   185  	}
   186  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   187  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   188  	}
   189  
   190  	msg, err := server.TokenMetadata(ctx, &protoReq)
   191  	return msg, metadata, err
   192  
   193  }
   194  
   195  // RegisterInjectiveMetaRPCHandlerServer registers the http handlers for service InjectiveMetaRPC to "mux".
   196  // UnaryRPC     :call InjectiveMetaRPCServer directly.
   197  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   198  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterInjectiveMetaRPCHandlerFromEndpoint instead.
   199  func RegisterInjectiveMetaRPCHandlerServer(ctx context.Context, mux *runtime.ServeMux, server InjectiveMetaRPCServer) error {
   200  
   201  	mux.Handle("POST", pattern_InjectiveMetaRPC_Ping_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   202  		ctx, cancel := context.WithCancel(req.Context())
   203  		defer cancel()
   204  		var stream runtime.ServerTransportStream
   205  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   206  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   207  		var err error
   208  		var annotatedContext context.Context
   209  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Ping", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Ping"))
   210  		if err != nil {
   211  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   212  			return
   213  		}
   214  		resp, md, err := local_request_InjectiveMetaRPC_Ping_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   215  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   216  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   217  		if err != nil {
   218  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   219  			return
   220  		}
   221  
   222  		forward_InjectiveMetaRPC_Ping_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   223  
   224  	})
   225  
   226  	mux.Handle("POST", pattern_InjectiveMetaRPC_Version_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   227  		ctx, cancel := context.WithCancel(req.Context())
   228  		defer cancel()
   229  		var stream runtime.ServerTransportStream
   230  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   231  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   232  		var err error
   233  		var annotatedContext context.Context
   234  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Version", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Version"))
   235  		if err != nil {
   236  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   237  			return
   238  		}
   239  		resp, md, err := local_request_InjectiveMetaRPC_Version_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   240  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   241  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   242  		if err != nil {
   243  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   244  			return
   245  		}
   246  
   247  		forward_InjectiveMetaRPC_Version_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   248  
   249  	})
   250  
   251  	mux.Handle("POST", pattern_InjectiveMetaRPC_Info_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   252  		ctx, cancel := context.WithCancel(req.Context())
   253  		defer cancel()
   254  		var stream runtime.ServerTransportStream
   255  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   256  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   257  		var err error
   258  		var annotatedContext context.Context
   259  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Info", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Info"))
   260  		if err != nil {
   261  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   262  			return
   263  		}
   264  		resp, md, err := local_request_InjectiveMetaRPC_Info_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   265  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   266  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   267  		if err != nil {
   268  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   269  			return
   270  		}
   271  
   272  		forward_InjectiveMetaRPC_Info_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   273  
   274  	})
   275  
   276  	mux.Handle("POST", pattern_InjectiveMetaRPC_StreamKeepalive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   277  		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
   278  		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   279  		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   280  		return
   281  	})
   282  
   283  	mux.Handle("POST", pattern_InjectiveMetaRPC_TokenMetadata_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   284  		ctx, cancel := context.WithCancel(req.Context())
   285  		defer cancel()
   286  		var stream runtime.ServerTransportStream
   287  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   288  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   289  		var err error
   290  		var annotatedContext context.Context
   291  		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata"))
   292  		if err != nil {
   293  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   294  			return
   295  		}
   296  		resp, md, err := local_request_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, inboundMarshaler, server, req, pathParams)
   297  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   298  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   299  		if err != nil {
   300  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   301  			return
   302  		}
   303  
   304  		forward_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   305  
   306  	})
   307  
   308  	return nil
   309  }
   310  
   311  // RegisterInjectiveMetaRPCHandlerFromEndpoint is same as RegisterInjectiveMetaRPCHandler but
   312  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   313  func RegisterInjectiveMetaRPCHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   314  	conn, err := grpc.Dial(endpoint, opts...)
   315  	if err != nil {
   316  		return err
   317  	}
   318  	defer func() {
   319  		if err != nil {
   320  			if cerr := conn.Close(); cerr != nil {
   321  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   322  			}
   323  			return
   324  		}
   325  		go func() {
   326  			<-ctx.Done()
   327  			if cerr := conn.Close(); cerr != nil {
   328  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   329  			}
   330  		}()
   331  	}()
   332  
   333  	return RegisterInjectiveMetaRPCHandler(ctx, mux, conn)
   334  }
   335  
   336  // RegisterInjectiveMetaRPCHandler registers the http handlers for service InjectiveMetaRPC to "mux".
   337  // The handlers forward requests to the grpc endpoint over "conn".
   338  func RegisterInjectiveMetaRPCHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   339  	return RegisterInjectiveMetaRPCHandlerClient(ctx, mux, NewInjectiveMetaRPCClient(conn))
   340  }
   341  
   342  // RegisterInjectiveMetaRPCHandlerClient registers the http handlers for service InjectiveMetaRPC
   343  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "InjectiveMetaRPCClient".
   344  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "InjectiveMetaRPCClient"
   345  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   346  // "InjectiveMetaRPCClient" to call the correct interceptors.
   347  func RegisterInjectiveMetaRPCHandlerClient(ctx context.Context, mux *runtime.ServeMux, client InjectiveMetaRPCClient) error {
   348  
   349  	mux.Handle("POST", pattern_InjectiveMetaRPC_Ping_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   350  		ctx, cancel := context.WithCancel(req.Context())
   351  		defer cancel()
   352  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   353  		var err error
   354  		var annotatedContext context.Context
   355  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Ping", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Ping"))
   356  		if err != nil {
   357  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   358  			return
   359  		}
   360  		resp, md, err := request_InjectiveMetaRPC_Ping_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   361  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   362  		if err != nil {
   363  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   364  			return
   365  		}
   366  
   367  		forward_InjectiveMetaRPC_Ping_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   368  
   369  	})
   370  
   371  	mux.Handle("POST", pattern_InjectiveMetaRPC_Version_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   372  		ctx, cancel := context.WithCancel(req.Context())
   373  		defer cancel()
   374  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   375  		var err error
   376  		var annotatedContext context.Context
   377  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Version", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Version"))
   378  		if err != nil {
   379  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   380  			return
   381  		}
   382  		resp, md, err := request_InjectiveMetaRPC_Version_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   383  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   384  		if err != nil {
   385  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   386  			return
   387  		}
   388  
   389  		forward_InjectiveMetaRPC_Version_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   390  
   391  	})
   392  
   393  	mux.Handle("POST", pattern_InjectiveMetaRPC_Info_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   394  		ctx, cancel := context.WithCancel(req.Context())
   395  		defer cancel()
   396  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   397  		var err error
   398  		var annotatedContext context.Context
   399  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/Info", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/Info"))
   400  		if err != nil {
   401  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   402  			return
   403  		}
   404  		resp, md, err := request_InjectiveMetaRPC_Info_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   405  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   406  		if err != nil {
   407  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   408  			return
   409  		}
   410  
   411  		forward_InjectiveMetaRPC_Info_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   412  
   413  	})
   414  
   415  	mux.Handle("POST", pattern_InjectiveMetaRPC_StreamKeepalive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   416  		ctx, cancel := context.WithCancel(req.Context())
   417  		defer cancel()
   418  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   419  		var err error
   420  		var annotatedContext context.Context
   421  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/StreamKeepalive", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/StreamKeepalive"))
   422  		if err != nil {
   423  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   424  			return
   425  		}
   426  		resp, md, err := request_InjectiveMetaRPC_StreamKeepalive_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   427  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   428  		if err != nil {
   429  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   430  			return
   431  		}
   432  
   433  		forward_InjectiveMetaRPC_StreamKeepalive_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
   434  
   435  	})
   436  
   437  	mux.Handle("POST", pattern_InjectiveMetaRPC_TokenMetadata_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   438  		ctx, cancel := context.WithCancel(req.Context())
   439  		defer cancel()
   440  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   441  		var err error
   442  		var annotatedContext context.Context
   443  		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata", runtime.WithHTTPPathPattern("/injective_meta_rpc.InjectiveMetaRPC/TokenMetadata"))
   444  		if err != nil {
   445  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   446  			return
   447  		}
   448  		resp, md, err := request_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, inboundMarshaler, client, req, pathParams)
   449  		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
   450  		if err != nil {
   451  			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
   452  			return
   453  		}
   454  
   455  		forward_InjectiveMetaRPC_TokenMetadata_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   456  
   457  	})
   458  
   459  	return nil
   460  }
   461  
   462  var (
   463  	pattern_InjectiveMetaRPC_Ping_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Ping"}, ""))
   464  
   465  	pattern_InjectiveMetaRPC_Version_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Version"}, ""))
   466  
   467  	pattern_InjectiveMetaRPC_Info_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "Info"}, ""))
   468  
   469  	pattern_InjectiveMetaRPC_StreamKeepalive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "StreamKeepalive"}, ""))
   470  
   471  	pattern_InjectiveMetaRPC_TokenMetadata_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"injective_meta_rpc.InjectiveMetaRPC", "TokenMetadata"}, ""))
   472  )
   473  
   474  var (
   475  	forward_InjectiveMetaRPC_Ping_0 = runtime.ForwardResponseMessage
   476  
   477  	forward_InjectiveMetaRPC_Version_0 = runtime.ForwardResponseMessage
   478  
   479  	forward_InjectiveMetaRPC_Info_0 = runtime.ForwardResponseMessage
   480  
   481  	forward_InjectiveMetaRPC_StreamKeepalive_0 = runtime.ForwardResponseStream
   482  
   483  	forward_InjectiveMetaRPC_TokenMetadata_0 = runtime.ForwardResponseMessage
   484  )