github.com/prysmaticlabs/prysm@v1.4.4/proto/validator/accounts/v2/keymanager.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: proto/validator/accounts/v2/keymanager.proto 3 4 /* 5 Package ethereum_validator_accounts_v2 is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package ethereum_validator_accounts_v2 10 11 import ( 12 "context" 13 "io" 14 "net/http" 15 16 "github.com/golang/protobuf/ptypes/empty" 17 emptypb "github.com/golang/protobuf/ptypes/empty" 18 "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" 19 "github.com/grpc-ecosystem/grpc-gateway/v2/utilities" 20 github_com_prysmaticlabs_eth2_types "github.com/prysmaticlabs/eth2-types" 21 "google.golang.org/grpc" 22 "google.golang.org/grpc/codes" 23 "google.golang.org/grpc/grpclog" 24 "google.golang.org/grpc/metadata" 25 "google.golang.org/grpc/status" 26 "google.golang.org/protobuf/proto" 27 ) 28 29 // Suppress "imported and not used" errors 30 var _ codes.Code 31 var _ io.Reader 32 var _ status.Status 33 var _ = runtime.String 34 var _ = utilities.NewDoubleArray 35 var _ = metadata.Join 36 var _ = github_com_prysmaticlabs_eth2_types.Epoch(0) 37 var _ = emptypb.Empty{} 38 var _ = empty.Empty{} 39 40 func request_RemoteSigner_ListValidatingPublicKeys_0(ctx context.Context, marshaler runtime.Marshaler, client RemoteSignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 41 var protoReq emptypb.Empty 42 var metadata runtime.ServerMetadata 43 44 msg, err := client.ListValidatingPublicKeys(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 45 return msg, metadata, err 46 47 } 48 49 func local_request_RemoteSigner_ListValidatingPublicKeys_0(ctx context.Context, marshaler runtime.Marshaler, server RemoteSignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 50 var protoReq emptypb.Empty 51 var metadata runtime.ServerMetadata 52 53 msg, err := server.ListValidatingPublicKeys(ctx, &protoReq) 54 return msg, metadata, err 55 56 } 57 58 var ( 59 filter_RemoteSigner_Sign_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 60 ) 61 62 func request_RemoteSigner_Sign_0(ctx context.Context, marshaler runtime.Marshaler, client RemoteSignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 63 var protoReq SignRequest 64 var metadata runtime.ServerMetadata 65 66 if err := req.ParseForm(); err != nil { 67 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 68 } 69 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_RemoteSigner_Sign_0); err != nil { 70 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 71 } 72 73 msg, err := client.Sign(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 74 return msg, metadata, err 75 76 } 77 78 func local_request_RemoteSigner_Sign_0(ctx context.Context, marshaler runtime.Marshaler, server RemoteSignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 79 var protoReq SignRequest 80 var metadata runtime.ServerMetadata 81 82 if err := req.ParseForm(); err != nil { 83 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 84 } 85 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_RemoteSigner_Sign_0); err != nil { 86 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 87 } 88 89 msg, err := server.Sign(ctx, &protoReq) 90 return msg, metadata, err 91 92 } 93 94 // RegisterRemoteSignerHandlerServer registers the http handlers for service RemoteSigner to "mux". 95 // UnaryRPC :call RemoteSignerServer directly. 96 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 97 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterRemoteSignerHandlerFromEndpoint instead. 98 func RegisterRemoteSignerHandlerServer(ctx context.Context, mux *runtime.ServeMux, server RemoteSignerServer) error { 99 100 mux.Handle("GET", pattern_RemoteSigner_ListValidatingPublicKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 101 ctx, cancel := context.WithCancel(req.Context()) 102 defer cancel() 103 var stream runtime.ServerTransportStream 104 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 105 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 106 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/ListValidatingPublicKeys") 107 if err != nil { 108 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 109 return 110 } 111 resp, md, err := local_request_RemoteSigner_ListValidatingPublicKeys_0(rctx, inboundMarshaler, server, req, pathParams) 112 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 113 ctx = runtime.NewServerMetadataContext(ctx, md) 114 if err != nil { 115 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 116 return 117 } 118 119 forward_RemoteSigner_ListValidatingPublicKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 120 121 }) 122 123 mux.Handle("POST", pattern_RemoteSigner_Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 124 ctx, cancel := context.WithCancel(req.Context()) 125 defer cancel() 126 var stream runtime.ServerTransportStream 127 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 128 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 129 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/Sign") 130 if err != nil { 131 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 132 return 133 } 134 resp, md, err := local_request_RemoteSigner_Sign_0(rctx, inboundMarshaler, server, req, pathParams) 135 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 136 ctx = runtime.NewServerMetadataContext(ctx, md) 137 if err != nil { 138 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 139 return 140 } 141 142 forward_RemoteSigner_Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 143 144 }) 145 146 return nil 147 } 148 149 // RegisterRemoteSignerHandlerFromEndpoint is same as RegisterRemoteSignerHandler but 150 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 151 func RegisterRemoteSignerHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 152 conn, err := grpc.Dial(endpoint, opts...) 153 if err != nil { 154 return err 155 } 156 defer func() { 157 if err != nil { 158 if cerr := conn.Close(); cerr != nil { 159 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 160 } 161 return 162 } 163 go func() { 164 <-ctx.Done() 165 if cerr := conn.Close(); cerr != nil { 166 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 167 } 168 }() 169 }() 170 171 return RegisterRemoteSignerHandler(ctx, mux, conn) 172 } 173 174 // RegisterRemoteSignerHandler registers the http handlers for service RemoteSigner to "mux". 175 // The handlers forward requests to the grpc endpoint over "conn". 176 func RegisterRemoteSignerHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 177 return RegisterRemoteSignerHandlerClient(ctx, mux, NewRemoteSignerClient(conn)) 178 } 179 180 // RegisterRemoteSignerHandlerClient registers the http handlers for service RemoteSigner 181 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "RemoteSignerClient". 182 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "RemoteSignerClient" 183 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 184 // "RemoteSignerClient" to call the correct interceptors. 185 func RegisterRemoteSignerHandlerClient(ctx context.Context, mux *runtime.ServeMux, client RemoteSignerClient) error { 186 187 mux.Handle("GET", pattern_RemoteSigner_ListValidatingPublicKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 188 ctx, cancel := context.WithCancel(req.Context()) 189 defer cancel() 190 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 191 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/ListValidatingPublicKeys") 192 if err != nil { 193 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 194 return 195 } 196 resp, md, err := request_RemoteSigner_ListValidatingPublicKeys_0(rctx, inboundMarshaler, client, req, pathParams) 197 ctx = runtime.NewServerMetadataContext(ctx, md) 198 if err != nil { 199 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 200 return 201 } 202 203 forward_RemoteSigner_ListValidatingPublicKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 204 205 }) 206 207 mux.Handle("POST", pattern_RemoteSigner_Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 208 ctx, cancel := context.WithCancel(req.Context()) 209 defer cancel() 210 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 211 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/Sign") 212 if err != nil { 213 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 214 return 215 } 216 resp, md, err := request_RemoteSigner_Sign_0(rctx, inboundMarshaler, client, req, pathParams) 217 ctx = runtime.NewServerMetadataContext(ctx, md) 218 if err != nil { 219 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 220 return 221 } 222 223 forward_RemoteSigner_Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 224 225 }) 226 227 return nil 228 } 229 230 var ( 231 pattern_RemoteSigner_ListValidatingPublicKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 0}, []string{"accounts", "v2", "remote"}, "")) 232 233 pattern_RemoteSigner_Sign_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"accounts", "v2", "remote", "sign"}, "")) 234 ) 235 236 var ( 237 forward_RemoteSigner_ListValidatingPublicKeys_0 = runtime.ForwardResponseMessage 238 239 forward_RemoteSigner_Sign_0 = runtime.ForwardResponseMessage 240 )