github.com/prysmaticlabs/prysm@v1.4.4/proto/validator/accounts/v2/keymanager.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: proto/validator/accounts/v2/keymanager.proto
     3  
     4  /*
     5  Package ethereum_validator_accounts_v2 is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package ethereum_validator_accounts_v2
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/golang/protobuf/ptypes/empty"
    17  	emptypb "github.com/golang/protobuf/ptypes/empty"
    18  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    19  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    20  	github_com_prysmaticlabs_eth2_types "github.com/prysmaticlabs/eth2-types"
    21  	"google.golang.org/grpc"
    22  	"google.golang.org/grpc/codes"
    23  	"google.golang.org/grpc/grpclog"
    24  	"google.golang.org/grpc/metadata"
    25  	"google.golang.org/grpc/status"
    26  	"google.golang.org/protobuf/proto"
    27  )
    28  
    29  // Suppress "imported and not used" errors
    30  var _ codes.Code
    31  var _ io.Reader
    32  var _ status.Status
    33  var _ = runtime.String
    34  var _ = utilities.NewDoubleArray
    35  var _ = metadata.Join
    36  var _ = github_com_prysmaticlabs_eth2_types.Epoch(0)
    37  var _ = emptypb.Empty{}
    38  var _ = empty.Empty{}
    39  
    40  func request_RemoteSigner_ListValidatingPublicKeys_0(ctx context.Context, marshaler runtime.Marshaler, client RemoteSignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    41  	var protoReq emptypb.Empty
    42  	var metadata runtime.ServerMetadata
    43  
    44  	msg, err := client.ListValidatingPublicKeys(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    45  	return msg, metadata, err
    46  
    47  }
    48  
    49  func local_request_RemoteSigner_ListValidatingPublicKeys_0(ctx context.Context, marshaler runtime.Marshaler, server RemoteSignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    50  	var protoReq emptypb.Empty
    51  	var metadata runtime.ServerMetadata
    52  
    53  	msg, err := server.ListValidatingPublicKeys(ctx, &protoReq)
    54  	return msg, metadata, err
    55  
    56  }
    57  
    58  var (
    59  	filter_RemoteSigner_Sign_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
    60  )
    61  
    62  func request_RemoteSigner_Sign_0(ctx context.Context, marshaler runtime.Marshaler, client RemoteSignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    63  	var protoReq SignRequest
    64  	var metadata runtime.ServerMetadata
    65  
    66  	if err := req.ParseForm(); err != nil {
    67  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    68  	}
    69  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_RemoteSigner_Sign_0); err != nil {
    70  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    71  	}
    72  
    73  	msg, err := client.Sign(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    74  	return msg, metadata, err
    75  
    76  }
    77  
    78  func local_request_RemoteSigner_Sign_0(ctx context.Context, marshaler runtime.Marshaler, server RemoteSignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    79  	var protoReq SignRequest
    80  	var metadata runtime.ServerMetadata
    81  
    82  	if err := req.ParseForm(); err != nil {
    83  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    84  	}
    85  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_RemoteSigner_Sign_0); err != nil {
    86  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    87  	}
    88  
    89  	msg, err := server.Sign(ctx, &protoReq)
    90  	return msg, metadata, err
    91  
    92  }
    93  
    94  // RegisterRemoteSignerHandlerServer registers the http handlers for service RemoteSigner to "mux".
    95  // UnaryRPC     :call RemoteSignerServer directly.
    96  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
    97  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterRemoteSignerHandlerFromEndpoint instead.
    98  func RegisterRemoteSignerHandlerServer(ctx context.Context, mux *runtime.ServeMux, server RemoteSignerServer) error {
    99  
   100  	mux.Handle("GET", pattern_RemoteSigner_ListValidatingPublicKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   101  		ctx, cancel := context.WithCancel(req.Context())
   102  		defer cancel()
   103  		var stream runtime.ServerTransportStream
   104  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   105  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   106  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/ListValidatingPublicKeys")
   107  		if err != nil {
   108  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   109  			return
   110  		}
   111  		resp, md, err := local_request_RemoteSigner_ListValidatingPublicKeys_0(rctx, inboundMarshaler, server, req, pathParams)
   112  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   113  		ctx = runtime.NewServerMetadataContext(ctx, md)
   114  		if err != nil {
   115  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   116  			return
   117  		}
   118  
   119  		forward_RemoteSigner_ListValidatingPublicKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   120  
   121  	})
   122  
   123  	mux.Handle("POST", pattern_RemoteSigner_Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   124  		ctx, cancel := context.WithCancel(req.Context())
   125  		defer cancel()
   126  		var stream runtime.ServerTransportStream
   127  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   128  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   129  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/Sign")
   130  		if err != nil {
   131  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   132  			return
   133  		}
   134  		resp, md, err := local_request_RemoteSigner_Sign_0(rctx, inboundMarshaler, server, req, pathParams)
   135  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   136  		ctx = runtime.NewServerMetadataContext(ctx, md)
   137  		if err != nil {
   138  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   139  			return
   140  		}
   141  
   142  		forward_RemoteSigner_Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   143  
   144  	})
   145  
   146  	return nil
   147  }
   148  
   149  // RegisterRemoteSignerHandlerFromEndpoint is same as RegisterRemoteSignerHandler but
   150  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   151  func RegisterRemoteSignerHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   152  	conn, err := grpc.Dial(endpoint, opts...)
   153  	if err != nil {
   154  		return err
   155  	}
   156  	defer func() {
   157  		if err != nil {
   158  			if cerr := conn.Close(); cerr != nil {
   159  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   160  			}
   161  			return
   162  		}
   163  		go func() {
   164  			<-ctx.Done()
   165  			if cerr := conn.Close(); cerr != nil {
   166  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
   167  			}
   168  		}()
   169  	}()
   170  
   171  	return RegisterRemoteSignerHandler(ctx, mux, conn)
   172  }
   173  
   174  // RegisterRemoteSignerHandler registers the http handlers for service RemoteSigner to "mux".
   175  // The handlers forward requests to the grpc endpoint over "conn".
   176  func RegisterRemoteSignerHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   177  	return RegisterRemoteSignerHandlerClient(ctx, mux, NewRemoteSignerClient(conn))
   178  }
   179  
   180  // RegisterRemoteSignerHandlerClient registers the http handlers for service RemoteSigner
   181  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "RemoteSignerClient".
   182  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "RemoteSignerClient"
   183  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   184  // "RemoteSignerClient" to call the correct interceptors.
   185  func RegisterRemoteSignerHandlerClient(ctx context.Context, mux *runtime.ServeMux, client RemoteSignerClient) error {
   186  
   187  	mux.Handle("GET", pattern_RemoteSigner_ListValidatingPublicKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   188  		ctx, cancel := context.WithCancel(req.Context())
   189  		defer cancel()
   190  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   191  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/ListValidatingPublicKeys")
   192  		if err != nil {
   193  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   194  			return
   195  		}
   196  		resp, md, err := request_RemoteSigner_ListValidatingPublicKeys_0(rctx, inboundMarshaler, client, req, pathParams)
   197  		ctx = runtime.NewServerMetadataContext(ctx, md)
   198  		if err != nil {
   199  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   200  			return
   201  		}
   202  
   203  		forward_RemoteSigner_ListValidatingPublicKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   204  
   205  	})
   206  
   207  	mux.Handle("POST", pattern_RemoteSigner_Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   208  		ctx, cancel := context.WithCancel(req.Context())
   209  		defer cancel()
   210  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   211  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.RemoteSigner/Sign")
   212  		if err != nil {
   213  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   214  			return
   215  		}
   216  		resp, md, err := request_RemoteSigner_Sign_0(rctx, inboundMarshaler, client, req, pathParams)
   217  		ctx = runtime.NewServerMetadataContext(ctx, md)
   218  		if err != nil {
   219  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   220  			return
   221  		}
   222  
   223  		forward_RemoteSigner_Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   224  
   225  	})
   226  
   227  	return nil
   228  }
   229  
   230  var (
   231  	pattern_RemoteSigner_ListValidatingPublicKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 0}, []string{"accounts", "v2", "remote"}, ""))
   232  
   233  	pattern_RemoteSigner_Sign_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"accounts", "v2", "remote", "sign"}, ""))
   234  )
   235  
   236  var (
   237  	forward_RemoteSigner_ListValidatingPublicKeys_0 = runtime.ForwardResponseMessage
   238  
   239  	forward_RemoteSigner_Sign_0 = runtime.ForwardResponseMessage
   240  )