github.com/argoproj/argo-cd/v2@v2.10.9/pkg/apiclient/certificate/certificate.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: server/certificate/certificate.proto 3 4 /* 5 Package certificate is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package certificate 10 11 import ( 12 "context" 13 "io" 14 "net/http" 15 16 "github.com/golang/protobuf/descriptor" 17 "github.com/golang/protobuf/proto" 18 "github.com/grpc-ecosystem/grpc-gateway/runtime" 19 "github.com/grpc-ecosystem/grpc-gateway/utilities" 20 "google.golang.org/grpc" 21 "google.golang.org/grpc/codes" 22 "google.golang.org/grpc/grpclog" 23 "google.golang.org/grpc/metadata" 24 "google.golang.org/grpc/status" 25 ) 26 27 // Suppress "imported and not used" errors 28 var _ codes.Code 29 var _ io.Reader 30 var _ status.Status 31 var _ = runtime.String 32 var _ = utilities.NewDoubleArray 33 var _ = descriptor.ForMessage 34 var _ = metadata.Join 35 36 var ( 37 filter_CertificateService_ListCertificates_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 38 ) 39 40 func request_CertificateService_ListCertificates_0(ctx context.Context, marshaler runtime.Marshaler, client CertificateServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 41 var protoReq RepositoryCertificateQuery 42 var metadata runtime.ServerMetadata 43 44 if err := req.ParseForm(); err != nil { 45 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 46 } 47 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_ListCertificates_0); err != nil { 48 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 49 } 50 51 msg, err := client.ListCertificates(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 52 return msg, metadata, err 53 54 } 55 56 func local_request_CertificateService_ListCertificates_0(ctx context.Context, marshaler runtime.Marshaler, server CertificateServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 57 var protoReq RepositoryCertificateQuery 58 var metadata runtime.ServerMetadata 59 60 if err := req.ParseForm(); err != nil { 61 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 62 } 63 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_ListCertificates_0); err != nil { 64 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 65 } 66 67 msg, err := server.ListCertificates(ctx, &protoReq) 68 return msg, metadata, err 69 70 } 71 72 var ( 73 filter_CertificateService_CreateCertificate_0 = &utilities.DoubleArray{Encoding: map[string]int{"certificates": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} 74 ) 75 76 func request_CertificateService_CreateCertificate_0(ctx context.Context, marshaler runtime.Marshaler, client CertificateServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 77 var protoReq RepositoryCertificateCreateRequest 78 var metadata runtime.ServerMetadata 79 80 newReader, berr := utilities.IOReaderFactory(req.Body) 81 if berr != nil { 82 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 83 } 84 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq.Certificates); err != nil && err != io.EOF { 85 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 86 } 87 88 if err := req.ParseForm(); err != nil { 89 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 90 } 91 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_CreateCertificate_0); err != nil { 92 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 93 } 94 95 msg, err := client.CreateCertificate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 96 return msg, metadata, err 97 98 } 99 100 func local_request_CertificateService_CreateCertificate_0(ctx context.Context, marshaler runtime.Marshaler, server CertificateServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 101 var protoReq RepositoryCertificateCreateRequest 102 var metadata runtime.ServerMetadata 103 104 newReader, berr := utilities.IOReaderFactory(req.Body) 105 if berr != nil { 106 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 107 } 108 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq.Certificates); err != nil && err != io.EOF { 109 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 110 } 111 112 if err := req.ParseForm(); err != nil { 113 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 114 } 115 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_CreateCertificate_0); err != nil { 116 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 117 } 118 119 msg, err := server.CreateCertificate(ctx, &protoReq) 120 return msg, metadata, err 121 122 } 123 124 var ( 125 filter_CertificateService_DeleteCertificate_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 126 ) 127 128 func request_CertificateService_DeleteCertificate_0(ctx context.Context, marshaler runtime.Marshaler, client CertificateServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 129 var protoReq RepositoryCertificateQuery 130 var metadata runtime.ServerMetadata 131 132 if err := req.ParseForm(); err != nil { 133 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 134 } 135 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_DeleteCertificate_0); err != nil { 136 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 137 } 138 139 msg, err := client.DeleteCertificate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 140 return msg, metadata, err 141 142 } 143 144 func local_request_CertificateService_DeleteCertificate_0(ctx context.Context, marshaler runtime.Marshaler, server CertificateServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 145 var protoReq RepositoryCertificateQuery 146 var metadata runtime.ServerMetadata 147 148 if err := req.ParseForm(); err != nil { 149 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 150 } 151 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_CertificateService_DeleteCertificate_0); err != nil { 152 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 153 } 154 155 msg, err := server.DeleteCertificate(ctx, &protoReq) 156 return msg, metadata, err 157 158 } 159 160 // RegisterCertificateServiceHandlerServer registers the http handlers for service CertificateService to "mux". 161 // UnaryRPC :call CertificateServiceServer directly. 162 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 163 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterCertificateServiceHandlerFromEndpoint instead. 164 func RegisterCertificateServiceHandlerServer(ctx context.Context, mux *runtime.ServeMux, server CertificateServiceServer) error { 165 166 mux.Handle("GET", pattern_CertificateService_ListCertificates_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 167 ctx, cancel := context.WithCancel(req.Context()) 168 defer cancel() 169 var stream runtime.ServerTransportStream 170 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 171 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 172 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req) 173 if err != nil { 174 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 175 return 176 } 177 resp, md, err := local_request_CertificateService_ListCertificates_0(rctx, inboundMarshaler, server, req, pathParams) 178 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 179 ctx = runtime.NewServerMetadataContext(ctx, md) 180 if err != nil { 181 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 182 return 183 } 184 185 forward_CertificateService_ListCertificates_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 186 187 }) 188 189 mux.Handle("POST", pattern_CertificateService_CreateCertificate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 190 ctx, cancel := context.WithCancel(req.Context()) 191 defer cancel() 192 var stream runtime.ServerTransportStream 193 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 194 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 195 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req) 196 if err != nil { 197 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 198 return 199 } 200 resp, md, err := local_request_CertificateService_CreateCertificate_0(rctx, inboundMarshaler, server, req, pathParams) 201 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 202 ctx = runtime.NewServerMetadataContext(ctx, md) 203 if err != nil { 204 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 205 return 206 } 207 208 forward_CertificateService_CreateCertificate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 209 210 }) 211 212 mux.Handle("DELETE", pattern_CertificateService_DeleteCertificate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 213 ctx, cancel := context.WithCancel(req.Context()) 214 defer cancel() 215 var stream runtime.ServerTransportStream 216 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 217 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 218 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req) 219 if err != nil { 220 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 221 return 222 } 223 resp, md, err := local_request_CertificateService_DeleteCertificate_0(rctx, inboundMarshaler, server, req, pathParams) 224 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 225 ctx = runtime.NewServerMetadataContext(ctx, md) 226 if err != nil { 227 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 228 return 229 } 230 231 forward_CertificateService_DeleteCertificate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 232 233 }) 234 235 return nil 236 } 237 238 // RegisterCertificateServiceHandlerFromEndpoint is same as RegisterCertificateServiceHandler but 239 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 240 func RegisterCertificateServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 241 conn, err := grpc.Dial(endpoint, opts...) 242 if err != nil { 243 return err 244 } 245 defer func() { 246 if err != nil { 247 if cerr := conn.Close(); cerr != nil { 248 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 249 } 250 return 251 } 252 go func() { 253 <-ctx.Done() 254 if cerr := conn.Close(); cerr != nil { 255 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 256 } 257 }() 258 }() 259 260 return RegisterCertificateServiceHandler(ctx, mux, conn) 261 } 262 263 // RegisterCertificateServiceHandler registers the http handlers for service CertificateService to "mux". 264 // The handlers forward requests to the grpc endpoint over "conn". 265 func RegisterCertificateServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 266 return RegisterCertificateServiceHandlerClient(ctx, mux, NewCertificateServiceClient(conn)) 267 } 268 269 // RegisterCertificateServiceHandlerClient registers the http handlers for service CertificateService 270 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "CertificateServiceClient". 271 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "CertificateServiceClient" 272 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 273 // "CertificateServiceClient" to call the correct interceptors. 274 func RegisterCertificateServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client CertificateServiceClient) error { 275 276 mux.Handle("GET", pattern_CertificateService_ListCertificates_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 277 ctx, cancel := context.WithCancel(req.Context()) 278 defer cancel() 279 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 280 rctx, err := runtime.AnnotateContext(ctx, mux, req) 281 if err != nil { 282 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 283 return 284 } 285 resp, md, err := request_CertificateService_ListCertificates_0(rctx, inboundMarshaler, client, req, pathParams) 286 ctx = runtime.NewServerMetadataContext(ctx, md) 287 if err != nil { 288 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 289 return 290 } 291 292 forward_CertificateService_ListCertificates_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 293 294 }) 295 296 mux.Handle("POST", pattern_CertificateService_CreateCertificate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 297 ctx, cancel := context.WithCancel(req.Context()) 298 defer cancel() 299 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 300 rctx, err := runtime.AnnotateContext(ctx, mux, req) 301 if err != nil { 302 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 303 return 304 } 305 resp, md, err := request_CertificateService_CreateCertificate_0(rctx, inboundMarshaler, client, req, pathParams) 306 ctx = runtime.NewServerMetadataContext(ctx, md) 307 if err != nil { 308 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 309 return 310 } 311 312 forward_CertificateService_CreateCertificate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 313 314 }) 315 316 mux.Handle("DELETE", pattern_CertificateService_DeleteCertificate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 317 ctx, cancel := context.WithCancel(req.Context()) 318 defer cancel() 319 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 320 rctx, err := runtime.AnnotateContext(ctx, mux, req) 321 if err != nil { 322 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 323 return 324 } 325 resp, md, err := request_CertificateService_DeleteCertificate_0(rctx, inboundMarshaler, client, req, pathParams) 326 ctx = runtime.NewServerMetadataContext(ctx, md) 327 if err != nil { 328 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 329 return 330 } 331 332 forward_CertificateService_DeleteCertificate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 333 334 }) 335 336 return nil 337 } 338 339 var ( 340 pattern_CertificateService_ListCertificates_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"api", "v1", "certificates"}, "", runtime.AssumeColonVerbOpt(true))) 341 342 pattern_CertificateService_CreateCertificate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"api", "v1", "certificates"}, "", runtime.AssumeColonVerbOpt(true))) 343 344 pattern_CertificateService_DeleteCertificate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"api", "v1", "certificates"}, "", runtime.AssumeColonVerbOpt(true))) 345 ) 346 347 var ( 348 forward_CertificateService_ListCertificates_0 = runtime.ForwardResponseMessage 349 350 forward_CertificateService_CreateCertificate_0 = runtime.ForwardResponseMessage 351 352 forward_CertificateService_DeleteCertificate_0 = runtime.ForwardResponseMessage 353 )