github.com/decred/dcrlnd@v0.7.6/lnrpc/signrpc/signer.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: signrpc/signer.proto
     3  
     4  /*
     5  Package signrpc is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package signrpc
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    17  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    18  	"google.golang.org/grpc"
    19  	"google.golang.org/grpc/codes"
    20  	"google.golang.org/grpc/grpclog"
    21  	"google.golang.org/grpc/metadata"
    22  	"google.golang.org/grpc/status"
    23  	"google.golang.org/protobuf/proto"
    24  )
    25  
    26  // Suppress "imported and not used" errors
    27  var _ codes.Code
    28  var _ io.Reader
    29  var _ status.Status
    30  var _ = runtime.String
    31  var _ = utilities.NewDoubleArray
    32  var _ = metadata.Join
    33  
    34  func request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    35  	var protoReq SignReq
    36  	var metadata runtime.ServerMetadata
    37  
    38  	newReader, berr := utilities.IOReaderFactory(req.Body)
    39  	if berr != nil {
    40  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    41  	}
    42  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    43  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    44  	}
    45  
    46  	msg, err := client.SignOutputRaw(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    47  	return msg, metadata, err
    48  
    49  }
    50  
    51  func local_request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    52  	var protoReq SignReq
    53  	var metadata runtime.ServerMetadata
    54  
    55  	newReader, berr := utilities.IOReaderFactory(req.Body)
    56  	if berr != nil {
    57  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    58  	}
    59  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    60  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    61  	}
    62  
    63  	msg, err := server.SignOutputRaw(ctx, &protoReq)
    64  	return msg, metadata, err
    65  
    66  }
    67  
    68  func request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    69  	var protoReq SignReq
    70  	var metadata runtime.ServerMetadata
    71  
    72  	newReader, berr := utilities.IOReaderFactory(req.Body)
    73  	if berr != nil {
    74  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    75  	}
    76  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    77  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    78  	}
    79  
    80  	msg, err := client.ComputeInputScript(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    81  	return msg, metadata, err
    82  
    83  }
    84  
    85  func local_request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    86  	var protoReq SignReq
    87  	var metadata runtime.ServerMetadata
    88  
    89  	newReader, berr := utilities.IOReaderFactory(req.Body)
    90  	if berr != nil {
    91  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    92  	}
    93  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    94  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    95  	}
    96  
    97  	msg, err := server.ComputeInputScript(ctx, &protoReq)
    98  	return msg, metadata, err
    99  
   100  }
   101  
   102  func request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   103  	var protoReq SignMessageReq
   104  	var metadata runtime.ServerMetadata
   105  
   106  	newReader, berr := utilities.IOReaderFactory(req.Body)
   107  	if berr != nil {
   108  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   109  	}
   110  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   111  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   112  	}
   113  
   114  	msg, err := client.SignMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   115  	return msg, metadata, err
   116  
   117  }
   118  
   119  func local_request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   120  	var protoReq SignMessageReq
   121  	var metadata runtime.ServerMetadata
   122  
   123  	newReader, berr := utilities.IOReaderFactory(req.Body)
   124  	if berr != nil {
   125  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   126  	}
   127  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   128  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   129  	}
   130  
   131  	msg, err := server.SignMessage(ctx, &protoReq)
   132  	return msg, metadata, err
   133  
   134  }
   135  
   136  func request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   137  	var protoReq VerifyMessageReq
   138  	var metadata runtime.ServerMetadata
   139  
   140  	newReader, berr := utilities.IOReaderFactory(req.Body)
   141  	if berr != nil {
   142  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   143  	}
   144  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   145  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   146  	}
   147  
   148  	msg, err := client.VerifyMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   149  	return msg, metadata, err
   150  
   151  }
   152  
   153  func local_request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   154  	var protoReq VerifyMessageReq
   155  	var metadata runtime.ServerMetadata
   156  
   157  	newReader, berr := utilities.IOReaderFactory(req.Body)
   158  	if berr != nil {
   159  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   160  	}
   161  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   162  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   163  	}
   164  
   165  	msg, err := server.VerifyMessage(ctx, &protoReq)
   166  	return msg, metadata, err
   167  
   168  }
   169  
   170  func request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   171  	var protoReq SharedKeyRequest
   172  	var metadata runtime.ServerMetadata
   173  
   174  	newReader, berr := utilities.IOReaderFactory(req.Body)
   175  	if berr != nil {
   176  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   177  	}
   178  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   179  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   180  	}
   181  
   182  	msg, err := client.DeriveSharedKey(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   183  	return msg, metadata, err
   184  
   185  }
   186  
   187  func local_request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   188  	var protoReq SharedKeyRequest
   189  	var metadata runtime.ServerMetadata
   190  
   191  	newReader, berr := utilities.IOReaderFactory(req.Body)
   192  	if berr != nil {
   193  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   194  	}
   195  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   196  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   197  	}
   198  
   199  	msg, err := server.DeriveSharedKey(ctx, &protoReq)
   200  	return msg, metadata, err
   201  
   202  }
   203  
   204  // RegisterSignerHandlerServer registers the http handlers for service Signer to "mux".
   205  // UnaryRPC     :call SignerServer directly.
   206  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   207  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSignerHandlerFromEndpoint instead.
   208  func RegisterSignerHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SignerServer) error {
   209  
   210  	mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   211  		ctx, cancel := context.WithCancel(req.Context())
   212  		defer cancel()
   213  		var stream runtime.ServerTransportStream
   214  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   215  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   216  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw"))
   217  		if err != nil {
   218  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   219  			return
   220  		}
   221  		resp, md, err := local_request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, server, req, pathParams)
   222  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   223  		ctx = runtime.NewServerMetadataContext(ctx, md)
   224  		if err != nil {
   225  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   226  			return
   227  		}
   228  
   229  		forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   230  
   231  	})
   232  
   233  	mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   234  		ctx, cancel := context.WithCancel(req.Context())
   235  		defer cancel()
   236  		var stream runtime.ServerTransportStream
   237  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   238  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   239  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript"))
   240  		if err != nil {
   241  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   242  			return
   243  		}
   244  		resp, md, err := local_request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, server, req, pathParams)
   245  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   246  		ctx = runtime.NewServerMetadataContext(ctx, md)
   247  		if err != nil {
   248  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   249  			return
   250  		}
   251  
   252  		forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   253  
   254  	})
   255  
   256  	mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   257  		ctx, cancel := context.WithCancel(req.Context())
   258  		defer cancel()
   259  		var stream runtime.ServerTransportStream
   260  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   261  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   262  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage"))
   263  		if err != nil {
   264  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   265  			return
   266  		}
   267  		resp, md, err := local_request_Signer_SignMessage_0(rctx, inboundMarshaler, server, req, pathParams)
   268  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   269  		ctx = runtime.NewServerMetadataContext(ctx, md)
   270  		if err != nil {
   271  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   272  			return
   273  		}
   274  
   275  		forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   276  
   277  	})
   278  
   279  	mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   280  		ctx, cancel := context.WithCancel(req.Context())
   281  		defer cancel()
   282  		var stream runtime.ServerTransportStream
   283  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   284  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   285  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage"))
   286  		if err != nil {
   287  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   288  			return
   289  		}
   290  		resp, md, err := local_request_Signer_VerifyMessage_0(rctx, inboundMarshaler, server, req, pathParams)
   291  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   292  		ctx = runtime.NewServerMetadataContext(ctx, md)
   293  		if err != nil {
   294  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   295  			return
   296  		}
   297  
   298  		forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   299  
   300  	})
   301  
   302  	mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   303  		ctx, cancel := context.WithCancel(req.Context())
   304  		defer cancel()
   305  		var stream runtime.ServerTransportStream
   306  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   307  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   308  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey"))
   309  		if err != nil {
   310  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   311  			return
   312  		}
   313  		resp, md, err := local_request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, server, req, pathParams)
   314  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   315  		ctx = runtime.NewServerMetadataContext(ctx, md)
   316  		if err != nil {
   317  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   318  			return
   319  		}
   320  
   321  		forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   322  
   323  	})
   324  
   325  	return nil
   326  }
   327  
   328  // RegisterSignerHandlerFromEndpoint is same as RegisterSignerHandler but
   329  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   330  func RegisterSignerHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   331  	conn, err := grpc.Dial(endpoint, opts...)
   332  	if err != nil {
   333  		return err
   334  	}
   335  	defer func() {
   336  		if err != nil {
   337  			if cerr := conn.Close(); cerr != nil {
   338  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   339  			}
   340  			return
   341  		}
   342  		go func() {
   343  			<-ctx.Done()
   344  			if cerr := conn.Close(); cerr != nil {
   345  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   346  			}
   347  		}()
   348  	}()
   349  
   350  	return RegisterSignerHandler(ctx, mux, conn)
   351  }
   352  
   353  // RegisterSignerHandler registers the http handlers for service Signer to "mux".
   354  // The handlers forward requests to the grpc endpoint over "conn".
   355  func RegisterSignerHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   356  	return RegisterSignerHandlerClient(ctx, mux, NewSignerClient(conn))
   357  }
   358  
   359  // RegisterSignerHandlerClient registers the http handlers for service Signer
   360  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SignerClient".
   361  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SignerClient"
   362  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   363  // "SignerClient" to call the correct interceptors.
   364  func RegisterSignerHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SignerClient) error {
   365  
   366  	mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   367  		ctx, cancel := context.WithCancel(req.Context())
   368  		defer cancel()
   369  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   370  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw"))
   371  		if err != nil {
   372  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   373  			return
   374  		}
   375  		resp, md, err := request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, client, req, pathParams)
   376  		ctx = runtime.NewServerMetadataContext(ctx, md)
   377  		if err != nil {
   378  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   379  			return
   380  		}
   381  
   382  		forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   383  
   384  	})
   385  
   386  	mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   387  		ctx, cancel := context.WithCancel(req.Context())
   388  		defer cancel()
   389  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   390  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript"))
   391  		if err != nil {
   392  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   393  			return
   394  		}
   395  		resp, md, err := request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, client, req, pathParams)
   396  		ctx = runtime.NewServerMetadataContext(ctx, md)
   397  		if err != nil {
   398  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   399  			return
   400  		}
   401  
   402  		forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   403  
   404  	})
   405  
   406  	mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   407  		ctx, cancel := context.WithCancel(req.Context())
   408  		defer cancel()
   409  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   410  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage"))
   411  		if err != nil {
   412  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   413  			return
   414  		}
   415  		resp, md, err := request_Signer_SignMessage_0(rctx, inboundMarshaler, client, req, pathParams)
   416  		ctx = runtime.NewServerMetadataContext(ctx, md)
   417  		if err != nil {
   418  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   419  			return
   420  		}
   421  
   422  		forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   423  
   424  	})
   425  
   426  	mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   427  		ctx, cancel := context.WithCancel(req.Context())
   428  		defer cancel()
   429  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   430  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage"))
   431  		if err != nil {
   432  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   433  			return
   434  		}
   435  		resp, md, err := request_Signer_VerifyMessage_0(rctx, inboundMarshaler, client, req, pathParams)
   436  		ctx = runtime.NewServerMetadataContext(ctx, md)
   437  		if err != nil {
   438  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   439  			return
   440  		}
   441  
   442  		forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   443  
   444  	})
   445  
   446  	mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   447  		ctx, cancel := context.WithCancel(req.Context())
   448  		defer cancel()
   449  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   450  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey"))
   451  		if err != nil {
   452  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   453  			return
   454  		}
   455  		resp, md, err := request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, client, req, pathParams)
   456  		ctx = runtime.NewServerMetadataContext(ctx, md)
   457  		if err != nil {
   458  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   459  			return
   460  		}
   461  
   462  		forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   463  
   464  	})
   465  
   466  	return nil
   467  }
   468  
   469  var (
   470  	pattern_Signer_SignOutputRaw_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signraw"}, ""))
   471  
   472  	pattern_Signer_ComputeInputScript_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "inputscript"}, ""))
   473  
   474  	pattern_Signer_SignMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signmessage"}, ""))
   475  
   476  	pattern_Signer_VerifyMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "verifymessage"}, ""))
   477  
   478  	pattern_Signer_DeriveSharedKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "sharedkey"}, ""))
   479  )
   480  
   481  var (
   482  	forward_Signer_SignOutputRaw_0 = runtime.ForwardResponseMessage
   483  
   484  	forward_Signer_ComputeInputScript_0 = runtime.ForwardResponseMessage
   485  
   486  	forward_Signer_SignMessage_0 = runtime.ForwardResponseMessage
   487  
   488  	forward_Signer_VerifyMessage_0 = runtime.ForwardResponseMessage
   489  
   490  	forward_Signer_DeriveSharedKey_0 = runtime.ForwardResponseMessage
   491  )