github.com/prysmaticlabs/prysm@v1.4.4/proto/validator/accounts/v2/web_api.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: proto/validator/accounts/v2/web_api.proto 3 4 /* 5 Package ethereum_validator_accounts_v2 is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package ethereum_validator_accounts_v2 10 11 import ( 12 "context" 13 "io" 14 "net/http" 15 16 "github.com/golang/protobuf/ptypes/empty" 17 emptypb "github.com/golang/protobuf/ptypes/empty" 18 "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" 19 "github.com/grpc-ecosystem/grpc-gateway/v2/utilities" 20 github_com_prysmaticlabs_eth2_types "github.com/prysmaticlabs/eth2-types" 21 eth "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1" 22 "google.golang.org/grpc" 23 "google.golang.org/grpc/codes" 24 "google.golang.org/grpc/grpclog" 25 "google.golang.org/grpc/metadata" 26 "google.golang.org/grpc/status" 27 "google.golang.org/protobuf/proto" 28 ) 29 30 // Suppress "imported and not used" errors 31 var _ codes.Code 32 var _ io.Reader 33 var _ status.Status 34 var _ = runtime.String 35 var _ = utilities.NewDoubleArray 36 var _ = metadata.Join 37 var _ = github_com_prysmaticlabs_eth2_types.Epoch(0) 38 var _ = emptypb.Empty{} 39 var _ = empty.Empty{} 40 41 func request_Wallet_CreateWallet_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 42 var protoReq CreateWalletRequest 43 var metadata runtime.ServerMetadata 44 45 newReader, berr := utilities.IOReaderFactory(req.Body) 46 if berr != nil { 47 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 48 } 49 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 50 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 51 } 52 53 msg, err := client.CreateWallet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 54 return msg, metadata, err 55 56 } 57 58 func local_request_Wallet_CreateWallet_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 59 var protoReq CreateWalletRequest 60 var metadata runtime.ServerMetadata 61 62 newReader, berr := utilities.IOReaderFactory(req.Body) 63 if berr != nil { 64 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 65 } 66 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 67 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 68 } 69 70 msg, err := server.CreateWallet(ctx, &protoReq) 71 return msg, metadata, err 72 73 } 74 75 func request_Wallet_WalletConfig_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 76 var protoReq emptypb.Empty 77 var metadata runtime.ServerMetadata 78 79 msg, err := client.WalletConfig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 80 return msg, metadata, err 81 82 } 83 84 func local_request_Wallet_WalletConfig_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 85 var protoReq emptypb.Empty 86 var metadata runtime.ServerMetadata 87 88 msg, err := server.WalletConfig(ctx, &protoReq) 89 return msg, metadata, err 90 91 } 92 93 func request_Wallet_GenerateMnemonic_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 94 var protoReq emptypb.Empty 95 var metadata runtime.ServerMetadata 96 97 msg, err := client.GenerateMnemonic(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 98 return msg, metadata, err 99 100 } 101 102 func local_request_Wallet_GenerateMnemonic_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 103 var protoReq emptypb.Empty 104 var metadata runtime.ServerMetadata 105 106 msg, err := server.GenerateMnemonic(ctx, &protoReq) 107 return msg, metadata, err 108 109 } 110 111 func request_Wallet_ImportKeystores_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 112 var protoReq ImportKeystoresRequest 113 var metadata runtime.ServerMetadata 114 115 newReader, berr := utilities.IOReaderFactory(req.Body) 116 if berr != nil { 117 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 118 } 119 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 120 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 121 } 122 123 msg, err := client.ImportKeystores(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 124 return msg, metadata, err 125 126 } 127 128 func local_request_Wallet_ImportKeystores_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 129 var protoReq ImportKeystoresRequest 130 var metadata runtime.ServerMetadata 131 132 newReader, berr := utilities.IOReaderFactory(req.Body) 133 if berr != nil { 134 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 135 } 136 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 137 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 138 } 139 140 msg, err := server.ImportKeystores(ctx, &protoReq) 141 return msg, metadata, err 142 143 } 144 145 func request_Wallet_RecoverWallet_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 146 var protoReq RecoverWalletRequest 147 var metadata runtime.ServerMetadata 148 149 newReader, berr := utilities.IOReaderFactory(req.Body) 150 if berr != nil { 151 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 152 } 153 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 154 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 155 } 156 157 msg, err := client.RecoverWallet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 158 return msg, metadata, err 159 160 } 161 162 func local_request_Wallet_RecoverWallet_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 163 var protoReq RecoverWalletRequest 164 var metadata runtime.ServerMetadata 165 166 newReader, berr := utilities.IOReaderFactory(req.Body) 167 if berr != nil { 168 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 169 } 170 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 171 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 172 } 173 174 msg, err := server.RecoverWallet(ctx, &protoReq) 175 return msg, metadata, err 176 177 } 178 179 var ( 180 filter_Accounts_ListAccounts_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 181 ) 182 183 func request_Accounts_ListAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 184 var protoReq ListAccountsRequest 185 var metadata runtime.ServerMetadata 186 187 if err := req.ParseForm(); err != nil { 188 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 189 } 190 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Accounts_ListAccounts_0); err != nil { 191 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 192 } 193 194 msg, err := client.ListAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 195 return msg, metadata, err 196 197 } 198 199 func local_request_Accounts_ListAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 200 var protoReq ListAccountsRequest 201 var metadata runtime.ServerMetadata 202 203 if err := req.ParseForm(); err != nil { 204 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 205 } 206 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Accounts_ListAccounts_0); err != nil { 207 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 208 } 209 210 msg, err := server.ListAccounts(ctx, &protoReq) 211 return msg, metadata, err 212 213 } 214 215 func request_Accounts_BackupAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 216 var protoReq BackupAccountsRequest 217 var metadata runtime.ServerMetadata 218 219 newReader, berr := utilities.IOReaderFactory(req.Body) 220 if berr != nil { 221 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 222 } 223 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 224 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 225 } 226 227 msg, err := client.BackupAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 228 return msg, metadata, err 229 230 } 231 232 func local_request_Accounts_BackupAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 233 var protoReq BackupAccountsRequest 234 var metadata runtime.ServerMetadata 235 236 newReader, berr := utilities.IOReaderFactory(req.Body) 237 if berr != nil { 238 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 239 } 240 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 241 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 242 } 243 244 msg, err := server.BackupAccounts(ctx, &protoReq) 245 return msg, metadata, err 246 247 } 248 249 func request_Accounts_DeleteAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 250 var protoReq DeleteAccountsRequest 251 var metadata runtime.ServerMetadata 252 253 newReader, berr := utilities.IOReaderFactory(req.Body) 254 if berr != nil { 255 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 256 } 257 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 258 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 259 } 260 261 msg, err := client.DeleteAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 262 return msg, metadata, err 263 264 } 265 266 func local_request_Accounts_DeleteAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 267 var protoReq DeleteAccountsRequest 268 var metadata runtime.ServerMetadata 269 270 newReader, berr := utilities.IOReaderFactory(req.Body) 271 if berr != nil { 272 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 273 } 274 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 275 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 276 } 277 278 msg, err := server.DeleteAccounts(ctx, &protoReq) 279 return msg, metadata, err 280 281 } 282 283 func request_Accounts_ChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 284 var protoReq ChangePasswordRequest 285 var metadata runtime.ServerMetadata 286 287 newReader, berr := utilities.IOReaderFactory(req.Body) 288 if berr != nil { 289 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 290 } 291 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 292 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 293 } 294 295 msg, err := client.ChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 296 return msg, metadata, err 297 298 } 299 300 func local_request_Accounts_ChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 301 var protoReq ChangePasswordRequest 302 var metadata runtime.ServerMetadata 303 304 newReader, berr := utilities.IOReaderFactory(req.Body) 305 if berr != nil { 306 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 307 } 308 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 309 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 310 } 311 312 msg, err := server.ChangePassword(ctx, &protoReq) 313 return msg, metadata, err 314 315 } 316 317 func request_Accounts_VoluntaryExit_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 318 var protoReq VoluntaryExitRequest 319 var metadata runtime.ServerMetadata 320 321 newReader, berr := utilities.IOReaderFactory(req.Body) 322 if berr != nil { 323 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 324 } 325 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 326 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 327 } 328 329 msg, err := client.VoluntaryExit(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 330 return msg, metadata, err 331 332 } 333 334 func local_request_Accounts_VoluntaryExit_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 335 var protoReq VoluntaryExitRequest 336 var metadata runtime.ServerMetadata 337 338 newReader, berr := utilities.IOReaderFactory(req.Body) 339 if berr != nil { 340 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 341 } 342 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 343 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 344 } 345 346 msg, err := server.VoluntaryExit(ctx, &protoReq) 347 return msg, metadata, err 348 349 } 350 351 func request_Beacon_GetBeaconStatus_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 352 var protoReq emptypb.Empty 353 var metadata runtime.ServerMetadata 354 355 msg, err := client.GetBeaconStatus(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 356 return msg, metadata, err 357 358 } 359 360 func local_request_Beacon_GetBeaconStatus_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 361 var protoReq emptypb.Empty 362 var metadata runtime.ServerMetadata 363 364 msg, err := server.GetBeaconStatus(ctx, &protoReq) 365 return msg, metadata, err 366 367 } 368 369 var ( 370 filter_Beacon_GetValidatorParticipation_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 371 ) 372 373 func request_Beacon_GetValidatorParticipation_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 374 var protoReq eth.GetValidatorParticipationRequest 375 var metadata runtime.ServerMetadata 376 377 if err := req.ParseForm(); err != nil { 378 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 379 } 380 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorParticipation_0); err != nil { 381 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 382 } 383 384 msg, err := client.GetValidatorParticipation(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 385 return msg, metadata, err 386 387 } 388 389 func local_request_Beacon_GetValidatorParticipation_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 390 var protoReq eth.GetValidatorParticipationRequest 391 var metadata runtime.ServerMetadata 392 393 if err := req.ParseForm(); err != nil { 394 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 395 } 396 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorParticipation_0); err != nil { 397 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 398 } 399 400 msg, err := server.GetValidatorParticipation(ctx, &protoReq) 401 return msg, metadata, err 402 403 } 404 405 var ( 406 filter_Beacon_GetValidatorPerformance_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 407 ) 408 409 func request_Beacon_GetValidatorPerformance_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 410 var protoReq eth.ValidatorPerformanceRequest 411 var metadata runtime.ServerMetadata 412 413 if err := req.ParseForm(); err != nil { 414 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 415 } 416 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorPerformance_0); err != nil { 417 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 418 } 419 420 msg, err := client.GetValidatorPerformance(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 421 return msg, metadata, err 422 423 } 424 425 func local_request_Beacon_GetValidatorPerformance_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 426 var protoReq eth.ValidatorPerformanceRequest 427 var metadata runtime.ServerMetadata 428 429 if err := req.ParseForm(); err != nil { 430 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 431 } 432 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorPerformance_0); err != nil { 433 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 434 } 435 436 msg, err := server.GetValidatorPerformance(ctx, &protoReq) 437 return msg, metadata, err 438 439 } 440 441 var ( 442 filter_Beacon_GetValidators_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 443 ) 444 445 func request_Beacon_GetValidators_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 446 var protoReq eth.ListValidatorsRequest 447 var metadata runtime.ServerMetadata 448 449 if err := req.ParseForm(); err != nil { 450 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 451 } 452 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidators_0); err != nil { 453 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 454 } 455 456 msg, err := client.GetValidators(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 457 return msg, metadata, err 458 459 } 460 461 func local_request_Beacon_GetValidators_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 462 var protoReq eth.ListValidatorsRequest 463 var metadata runtime.ServerMetadata 464 465 if err := req.ParseForm(); err != nil { 466 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 467 } 468 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidators_0); err != nil { 469 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 470 } 471 472 msg, err := server.GetValidators(ctx, &protoReq) 473 return msg, metadata, err 474 475 } 476 477 var ( 478 filter_Beacon_GetValidatorBalances_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} 479 ) 480 481 func request_Beacon_GetValidatorBalances_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 482 var protoReq eth.ListValidatorBalancesRequest 483 var metadata runtime.ServerMetadata 484 485 if err := req.ParseForm(); err != nil { 486 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 487 } 488 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorBalances_0); err != nil { 489 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 490 } 491 492 msg, err := client.GetValidatorBalances(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 493 return msg, metadata, err 494 495 } 496 497 func local_request_Beacon_GetValidatorBalances_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 498 var protoReq eth.ListValidatorBalancesRequest 499 var metadata runtime.ServerMetadata 500 501 if err := req.ParseForm(); err != nil { 502 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 503 } 504 if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorBalances_0); err != nil { 505 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 506 } 507 508 msg, err := server.GetValidatorBalances(ctx, &protoReq) 509 return msg, metadata, err 510 511 } 512 513 func request_Beacon_GetValidatorQueue_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 514 var protoReq emptypb.Empty 515 var metadata runtime.ServerMetadata 516 517 msg, err := client.GetValidatorQueue(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 518 return msg, metadata, err 519 520 } 521 522 func local_request_Beacon_GetValidatorQueue_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 523 var protoReq emptypb.Empty 524 var metadata runtime.ServerMetadata 525 526 msg, err := server.GetValidatorQueue(ctx, &protoReq) 527 return msg, metadata, err 528 529 } 530 531 func request_Beacon_GetPeers_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 532 var protoReq emptypb.Empty 533 var metadata runtime.ServerMetadata 534 535 msg, err := client.GetPeers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 536 return msg, metadata, err 537 538 } 539 540 func local_request_Beacon_GetPeers_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 541 var protoReq emptypb.Empty 542 var metadata runtime.ServerMetadata 543 544 msg, err := server.GetPeers(ctx, &protoReq) 545 return msg, metadata, err 546 547 } 548 549 func request_SlashingProtection_ExportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, client SlashingProtectionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 550 var protoReq emptypb.Empty 551 var metadata runtime.ServerMetadata 552 553 newReader, berr := utilities.IOReaderFactory(req.Body) 554 if berr != nil { 555 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 556 } 557 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 558 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 559 } 560 561 msg, err := client.ExportSlashingProtection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 562 return msg, metadata, err 563 564 } 565 566 func local_request_SlashingProtection_ExportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, server SlashingProtectionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 567 var protoReq emptypb.Empty 568 var metadata runtime.ServerMetadata 569 570 newReader, berr := utilities.IOReaderFactory(req.Body) 571 if berr != nil { 572 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 573 } 574 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 575 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 576 } 577 578 msg, err := server.ExportSlashingProtection(ctx, &protoReq) 579 return msg, metadata, err 580 581 } 582 583 func request_SlashingProtection_ImportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, client SlashingProtectionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 584 var protoReq ImportSlashingProtectionRequest 585 var metadata runtime.ServerMetadata 586 587 newReader, berr := utilities.IOReaderFactory(req.Body) 588 if berr != nil { 589 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 590 } 591 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 592 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 593 } 594 595 msg, err := client.ImportSlashingProtection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 596 return msg, metadata, err 597 598 } 599 600 func local_request_SlashingProtection_ImportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, server SlashingProtectionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 601 var protoReq ImportSlashingProtectionRequest 602 var metadata runtime.ServerMetadata 603 604 newReader, berr := utilities.IOReaderFactory(req.Body) 605 if berr != nil { 606 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 607 } 608 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 609 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 610 } 611 612 msg, err := server.ImportSlashingProtection(ctx, &protoReq) 613 return msg, metadata, err 614 615 } 616 617 func request_Health_GetBeaconNodeConnection_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 618 var protoReq emptypb.Empty 619 var metadata runtime.ServerMetadata 620 621 msg, err := client.GetBeaconNodeConnection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 622 return msg, metadata, err 623 624 } 625 626 func local_request_Health_GetBeaconNodeConnection_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 627 var protoReq emptypb.Empty 628 var metadata runtime.ServerMetadata 629 630 msg, err := server.GetBeaconNodeConnection(ctx, &protoReq) 631 return msg, metadata, err 632 633 } 634 635 func request_Health_GetLogsEndpoints_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 636 var protoReq emptypb.Empty 637 var metadata runtime.ServerMetadata 638 639 msg, err := client.GetLogsEndpoints(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 640 return msg, metadata, err 641 642 } 643 644 func local_request_Health_GetLogsEndpoints_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 645 var protoReq emptypb.Empty 646 var metadata runtime.ServerMetadata 647 648 msg, err := server.GetLogsEndpoints(ctx, &protoReq) 649 return msg, metadata, err 650 651 } 652 653 func request_Health_GetVersion_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 654 var protoReq emptypb.Empty 655 var metadata runtime.ServerMetadata 656 657 msg, err := client.GetVersion(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 658 return msg, metadata, err 659 660 } 661 662 func local_request_Health_GetVersion_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 663 var protoReq emptypb.Empty 664 var metadata runtime.ServerMetadata 665 666 msg, err := server.GetVersion(ctx, &protoReq) 667 return msg, metadata, err 668 669 } 670 671 func request_Health_StreamBeaconLogs_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (Health_StreamBeaconLogsClient, runtime.ServerMetadata, error) { 672 var protoReq emptypb.Empty 673 var metadata runtime.ServerMetadata 674 675 stream, err := client.StreamBeaconLogs(ctx, &protoReq) 676 if err != nil { 677 return nil, metadata, err 678 } 679 header, err := stream.Header() 680 if err != nil { 681 return nil, metadata, err 682 } 683 metadata.HeaderMD = header 684 return stream, metadata, nil 685 686 } 687 688 func request_Health_StreamValidatorLogs_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (Health_StreamValidatorLogsClient, runtime.ServerMetadata, error) { 689 var protoReq emptypb.Empty 690 var metadata runtime.ServerMetadata 691 692 stream, err := client.StreamValidatorLogs(ctx, &protoReq) 693 if err != nil { 694 return nil, metadata, err 695 } 696 header, err := stream.Header() 697 if err != nil { 698 return nil, metadata, err 699 } 700 metadata.HeaderMD = header 701 return stream, metadata, nil 702 703 } 704 705 func request_Auth_HasUsedWeb_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 706 var protoReq emptypb.Empty 707 var metadata runtime.ServerMetadata 708 709 msg, err := client.HasUsedWeb(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 710 return msg, metadata, err 711 712 } 713 714 func local_request_Auth_HasUsedWeb_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 715 var protoReq emptypb.Empty 716 var metadata runtime.ServerMetadata 717 718 msg, err := server.HasUsedWeb(ctx, &protoReq) 719 return msg, metadata, err 720 721 } 722 723 func request_Auth_Login_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 724 var protoReq AuthRequest 725 var metadata runtime.ServerMetadata 726 727 newReader, berr := utilities.IOReaderFactory(req.Body) 728 if berr != nil { 729 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 730 } 731 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 732 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 733 } 734 735 msg, err := client.Login(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 736 return msg, metadata, err 737 738 } 739 740 func local_request_Auth_Login_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 741 var protoReq AuthRequest 742 var metadata runtime.ServerMetadata 743 744 newReader, berr := utilities.IOReaderFactory(req.Body) 745 if berr != nil { 746 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 747 } 748 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 749 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 750 } 751 752 msg, err := server.Login(ctx, &protoReq) 753 return msg, metadata, err 754 755 } 756 757 func request_Auth_Signup_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 758 var protoReq AuthRequest 759 var metadata runtime.ServerMetadata 760 761 newReader, berr := utilities.IOReaderFactory(req.Body) 762 if berr != nil { 763 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 764 } 765 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 766 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 767 } 768 769 msg, err := client.Signup(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 770 return msg, metadata, err 771 772 } 773 774 func local_request_Auth_Signup_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 775 var protoReq AuthRequest 776 var metadata runtime.ServerMetadata 777 778 newReader, berr := utilities.IOReaderFactory(req.Body) 779 if berr != nil { 780 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 781 } 782 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 783 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 784 } 785 786 msg, err := server.Signup(ctx, &protoReq) 787 return msg, metadata, err 788 789 } 790 791 func request_Auth_Logout_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 792 var protoReq emptypb.Empty 793 var metadata runtime.ServerMetadata 794 795 newReader, berr := utilities.IOReaderFactory(req.Body) 796 if berr != nil { 797 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 798 } 799 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 800 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 801 } 802 803 msg, err := client.Logout(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 804 return msg, metadata, err 805 806 } 807 808 func local_request_Auth_Logout_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 809 var protoReq emptypb.Empty 810 var metadata runtime.ServerMetadata 811 812 newReader, berr := utilities.IOReaderFactory(req.Body) 813 if berr != nil { 814 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 815 } 816 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 817 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 818 } 819 820 msg, err := server.Logout(ctx, &protoReq) 821 return msg, metadata, err 822 823 } 824 825 // RegisterWalletHandlerServer registers the http handlers for service Wallet to "mux". 826 // UnaryRPC :call WalletServer directly. 827 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 828 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWalletHandlerFromEndpoint instead. 829 func RegisterWalletHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WalletServer) error { 830 831 mux.Handle("POST", pattern_Wallet_CreateWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 832 ctx, cancel := context.WithCancel(req.Context()) 833 defer cancel() 834 var stream runtime.ServerTransportStream 835 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 836 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 837 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/CreateWallet") 838 if err != nil { 839 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 840 return 841 } 842 resp, md, err := local_request_Wallet_CreateWallet_0(rctx, inboundMarshaler, server, req, pathParams) 843 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 844 ctx = runtime.NewServerMetadataContext(ctx, md) 845 if err != nil { 846 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 847 return 848 } 849 850 forward_Wallet_CreateWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 851 852 }) 853 854 mux.Handle("GET", pattern_Wallet_WalletConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 855 ctx, cancel := context.WithCancel(req.Context()) 856 defer cancel() 857 var stream runtime.ServerTransportStream 858 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 859 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 860 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/WalletConfig") 861 if err != nil { 862 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 863 return 864 } 865 resp, md, err := local_request_Wallet_WalletConfig_0(rctx, inboundMarshaler, server, req, pathParams) 866 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 867 ctx = runtime.NewServerMetadataContext(ctx, md) 868 if err != nil { 869 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 870 return 871 } 872 873 forward_Wallet_WalletConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 874 875 }) 876 877 mux.Handle("GET", pattern_Wallet_GenerateMnemonic_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 878 ctx, cancel := context.WithCancel(req.Context()) 879 defer cancel() 880 var stream runtime.ServerTransportStream 881 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 882 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 883 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/GenerateMnemonic") 884 if err != nil { 885 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 886 return 887 } 888 resp, md, err := local_request_Wallet_GenerateMnemonic_0(rctx, inboundMarshaler, server, req, pathParams) 889 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 890 ctx = runtime.NewServerMetadataContext(ctx, md) 891 if err != nil { 892 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 893 return 894 } 895 896 forward_Wallet_GenerateMnemonic_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 897 898 }) 899 900 mux.Handle("POST", pattern_Wallet_ImportKeystores_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 901 ctx, cancel := context.WithCancel(req.Context()) 902 defer cancel() 903 var stream runtime.ServerTransportStream 904 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 905 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 906 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/ImportKeystores") 907 if err != nil { 908 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 909 return 910 } 911 resp, md, err := local_request_Wallet_ImportKeystores_0(rctx, inboundMarshaler, server, req, pathParams) 912 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 913 ctx = runtime.NewServerMetadataContext(ctx, md) 914 if err != nil { 915 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 916 return 917 } 918 919 forward_Wallet_ImportKeystores_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 920 921 }) 922 923 mux.Handle("POST", pattern_Wallet_RecoverWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 924 ctx, cancel := context.WithCancel(req.Context()) 925 defer cancel() 926 var stream runtime.ServerTransportStream 927 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 928 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 929 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/RecoverWallet") 930 if err != nil { 931 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 932 return 933 } 934 resp, md, err := local_request_Wallet_RecoverWallet_0(rctx, inboundMarshaler, server, req, pathParams) 935 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 936 ctx = runtime.NewServerMetadataContext(ctx, md) 937 if err != nil { 938 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 939 return 940 } 941 942 forward_Wallet_RecoverWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 943 944 }) 945 946 return nil 947 } 948 949 // RegisterAccountsHandlerServer registers the http handlers for service Accounts to "mux". 950 // UnaryRPC :call AccountsServer directly. 951 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 952 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterAccountsHandlerFromEndpoint instead. 953 func RegisterAccountsHandlerServer(ctx context.Context, mux *runtime.ServeMux, server AccountsServer) error { 954 955 mux.Handle("GET", pattern_Accounts_ListAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 956 ctx, cancel := context.WithCancel(req.Context()) 957 defer cancel() 958 var stream runtime.ServerTransportStream 959 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 960 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 961 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ListAccounts") 962 if err != nil { 963 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 964 return 965 } 966 resp, md, err := local_request_Accounts_ListAccounts_0(rctx, inboundMarshaler, server, req, pathParams) 967 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 968 ctx = runtime.NewServerMetadataContext(ctx, md) 969 if err != nil { 970 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 971 return 972 } 973 974 forward_Accounts_ListAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 975 976 }) 977 978 mux.Handle("POST", pattern_Accounts_BackupAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 979 ctx, cancel := context.WithCancel(req.Context()) 980 defer cancel() 981 var stream runtime.ServerTransportStream 982 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 983 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 984 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/BackupAccounts") 985 if err != nil { 986 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 987 return 988 } 989 resp, md, err := local_request_Accounts_BackupAccounts_0(rctx, inboundMarshaler, server, req, pathParams) 990 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 991 ctx = runtime.NewServerMetadataContext(ctx, md) 992 if err != nil { 993 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 994 return 995 } 996 997 forward_Accounts_BackupAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 998 999 }) 1000 1001 mux.Handle("POST", pattern_Accounts_DeleteAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1002 ctx, cancel := context.WithCancel(req.Context()) 1003 defer cancel() 1004 var stream runtime.ServerTransportStream 1005 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1006 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1007 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/DeleteAccounts") 1008 if err != nil { 1009 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1010 return 1011 } 1012 resp, md, err := local_request_Accounts_DeleteAccounts_0(rctx, inboundMarshaler, server, req, pathParams) 1013 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1014 ctx = runtime.NewServerMetadataContext(ctx, md) 1015 if err != nil { 1016 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1017 return 1018 } 1019 1020 forward_Accounts_DeleteAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1021 1022 }) 1023 1024 mux.Handle("POST", pattern_Accounts_ChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1025 ctx, cancel := context.WithCancel(req.Context()) 1026 defer cancel() 1027 var stream runtime.ServerTransportStream 1028 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1029 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1030 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ChangePassword") 1031 if err != nil { 1032 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1033 return 1034 } 1035 resp, md, err := local_request_Accounts_ChangePassword_0(rctx, inboundMarshaler, server, req, pathParams) 1036 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1037 ctx = runtime.NewServerMetadataContext(ctx, md) 1038 if err != nil { 1039 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1040 return 1041 } 1042 1043 forward_Accounts_ChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1044 1045 }) 1046 1047 mux.Handle("POST", pattern_Accounts_VoluntaryExit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1048 ctx, cancel := context.WithCancel(req.Context()) 1049 defer cancel() 1050 var stream runtime.ServerTransportStream 1051 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1052 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1053 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/VoluntaryExit") 1054 if err != nil { 1055 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1056 return 1057 } 1058 resp, md, err := local_request_Accounts_VoluntaryExit_0(rctx, inboundMarshaler, server, req, pathParams) 1059 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1060 ctx = runtime.NewServerMetadataContext(ctx, md) 1061 if err != nil { 1062 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1063 return 1064 } 1065 1066 forward_Accounts_VoluntaryExit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1067 1068 }) 1069 1070 return nil 1071 } 1072 1073 // RegisterBeaconHandlerServer registers the http handlers for service Beacon to "mux". 1074 // UnaryRPC :call BeaconServer directly. 1075 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 1076 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBeaconHandlerFromEndpoint instead. 1077 func RegisterBeaconHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BeaconServer) error { 1078 1079 mux.Handle("GET", pattern_Beacon_GetBeaconStatus_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1080 ctx, cancel := context.WithCancel(req.Context()) 1081 defer cancel() 1082 var stream runtime.ServerTransportStream 1083 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1084 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1085 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetBeaconStatus") 1086 if err != nil { 1087 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1088 return 1089 } 1090 resp, md, err := local_request_Beacon_GetBeaconStatus_0(rctx, inboundMarshaler, server, req, pathParams) 1091 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1092 ctx = runtime.NewServerMetadataContext(ctx, md) 1093 if err != nil { 1094 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1095 return 1096 } 1097 1098 forward_Beacon_GetBeaconStatus_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1099 1100 }) 1101 1102 mux.Handle("GET", pattern_Beacon_GetValidatorParticipation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1103 ctx, cancel := context.WithCancel(req.Context()) 1104 defer cancel() 1105 var stream runtime.ServerTransportStream 1106 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1107 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1108 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorParticipation") 1109 if err != nil { 1110 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1111 return 1112 } 1113 resp, md, err := local_request_Beacon_GetValidatorParticipation_0(rctx, inboundMarshaler, server, req, pathParams) 1114 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1115 ctx = runtime.NewServerMetadataContext(ctx, md) 1116 if err != nil { 1117 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1118 return 1119 } 1120 1121 forward_Beacon_GetValidatorParticipation_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1122 1123 }) 1124 1125 mux.Handle("GET", pattern_Beacon_GetValidatorPerformance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1126 ctx, cancel := context.WithCancel(req.Context()) 1127 defer cancel() 1128 var stream runtime.ServerTransportStream 1129 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1130 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1131 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorPerformance") 1132 if err != nil { 1133 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1134 return 1135 } 1136 resp, md, err := local_request_Beacon_GetValidatorPerformance_0(rctx, inboundMarshaler, server, req, pathParams) 1137 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1138 ctx = runtime.NewServerMetadataContext(ctx, md) 1139 if err != nil { 1140 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1141 return 1142 } 1143 1144 forward_Beacon_GetValidatorPerformance_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1145 1146 }) 1147 1148 mux.Handle("GET", pattern_Beacon_GetValidators_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1149 ctx, cancel := context.WithCancel(req.Context()) 1150 defer cancel() 1151 var stream runtime.ServerTransportStream 1152 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1153 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1154 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidators") 1155 if err != nil { 1156 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1157 return 1158 } 1159 resp, md, err := local_request_Beacon_GetValidators_0(rctx, inboundMarshaler, server, req, pathParams) 1160 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1161 ctx = runtime.NewServerMetadataContext(ctx, md) 1162 if err != nil { 1163 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1164 return 1165 } 1166 1167 forward_Beacon_GetValidators_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1168 1169 }) 1170 1171 mux.Handle("GET", pattern_Beacon_GetValidatorBalances_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1172 ctx, cancel := context.WithCancel(req.Context()) 1173 defer cancel() 1174 var stream runtime.ServerTransportStream 1175 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1176 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1177 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorBalances") 1178 if err != nil { 1179 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1180 return 1181 } 1182 resp, md, err := local_request_Beacon_GetValidatorBalances_0(rctx, inboundMarshaler, server, req, pathParams) 1183 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1184 ctx = runtime.NewServerMetadataContext(ctx, md) 1185 if err != nil { 1186 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1187 return 1188 } 1189 1190 forward_Beacon_GetValidatorBalances_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1191 1192 }) 1193 1194 mux.Handle("GET", pattern_Beacon_GetValidatorQueue_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1195 ctx, cancel := context.WithCancel(req.Context()) 1196 defer cancel() 1197 var stream runtime.ServerTransportStream 1198 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1199 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1200 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorQueue") 1201 if err != nil { 1202 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1203 return 1204 } 1205 resp, md, err := local_request_Beacon_GetValidatorQueue_0(rctx, inboundMarshaler, server, req, pathParams) 1206 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1207 ctx = runtime.NewServerMetadataContext(ctx, md) 1208 if err != nil { 1209 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1210 return 1211 } 1212 1213 forward_Beacon_GetValidatorQueue_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1214 1215 }) 1216 1217 mux.Handle("GET", pattern_Beacon_GetPeers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1218 ctx, cancel := context.WithCancel(req.Context()) 1219 defer cancel() 1220 var stream runtime.ServerTransportStream 1221 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1222 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1223 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetPeers") 1224 if err != nil { 1225 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1226 return 1227 } 1228 resp, md, err := local_request_Beacon_GetPeers_0(rctx, inboundMarshaler, server, req, pathParams) 1229 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1230 ctx = runtime.NewServerMetadataContext(ctx, md) 1231 if err != nil { 1232 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1233 return 1234 } 1235 1236 forward_Beacon_GetPeers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1237 1238 }) 1239 1240 return nil 1241 } 1242 1243 // RegisterSlashingProtectionHandlerServer registers the http handlers for service SlashingProtection to "mux". 1244 // UnaryRPC :call SlashingProtectionServer directly. 1245 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 1246 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSlashingProtectionHandlerFromEndpoint instead. 1247 func RegisterSlashingProtectionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SlashingProtectionServer) error { 1248 1249 mux.Handle("POST", pattern_SlashingProtection_ExportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1250 ctx, cancel := context.WithCancel(req.Context()) 1251 defer cancel() 1252 var stream runtime.ServerTransportStream 1253 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1254 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1255 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ExportSlashingProtection") 1256 if err != nil { 1257 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1258 return 1259 } 1260 resp, md, err := local_request_SlashingProtection_ExportSlashingProtection_0(rctx, inboundMarshaler, server, req, pathParams) 1261 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1262 ctx = runtime.NewServerMetadataContext(ctx, md) 1263 if err != nil { 1264 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1265 return 1266 } 1267 1268 forward_SlashingProtection_ExportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1269 1270 }) 1271 1272 mux.Handle("POST", pattern_SlashingProtection_ImportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1273 ctx, cancel := context.WithCancel(req.Context()) 1274 defer cancel() 1275 var stream runtime.ServerTransportStream 1276 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1277 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1278 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ImportSlashingProtection") 1279 if err != nil { 1280 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1281 return 1282 } 1283 resp, md, err := local_request_SlashingProtection_ImportSlashingProtection_0(rctx, inboundMarshaler, server, req, pathParams) 1284 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1285 ctx = runtime.NewServerMetadataContext(ctx, md) 1286 if err != nil { 1287 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1288 return 1289 } 1290 1291 forward_SlashingProtection_ImportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1292 1293 }) 1294 1295 return nil 1296 } 1297 1298 // RegisterHealthHandlerServer registers the http handlers for service Health to "mux". 1299 // UnaryRPC :call HealthServer directly. 1300 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 1301 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterHealthHandlerFromEndpoint instead. 1302 func RegisterHealthHandlerServer(ctx context.Context, mux *runtime.ServeMux, server HealthServer) error { 1303 1304 mux.Handle("GET", pattern_Health_GetBeaconNodeConnection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1305 ctx, cancel := context.WithCancel(req.Context()) 1306 defer cancel() 1307 var stream runtime.ServerTransportStream 1308 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1309 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1310 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetBeaconNodeConnection") 1311 if err != nil { 1312 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1313 return 1314 } 1315 resp, md, err := local_request_Health_GetBeaconNodeConnection_0(rctx, inboundMarshaler, server, req, pathParams) 1316 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1317 ctx = runtime.NewServerMetadataContext(ctx, md) 1318 if err != nil { 1319 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1320 return 1321 } 1322 1323 forward_Health_GetBeaconNodeConnection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1324 1325 }) 1326 1327 mux.Handle("GET", pattern_Health_GetLogsEndpoints_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1328 ctx, cancel := context.WithCancel(req.Context()) 1329 defer cancel() 1330 var stream runtime.ServerTransportStream 1331 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1332 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1333 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetLogsEndpoints") 1334 if err != nil { 1335 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1336 return 1337 } 1338 resp, md, err := local_request_Health_GetLogsEndpoints_0(rctx, inboundMarshaler, server, req, pathParams) 1339 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1340 ctx = runtime.NewServerMetadataContext(ctx, md) 1341 if err != nil { 1342 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1343 return 1344 } 1345 1346 forward_Health_GetLogsEndpoints_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1347 1348 }) 1349 1350 mux.Handle("GET", pattern_Health_GetVersion_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1351 ctx, cancel := context.WithCancel(req.Context()) 1352 defer cancel() 1353 var stream runtime.ServerTransportStream 1354 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1355 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1356 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetVersion") 1357 if err != nil { 1358 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1359 return 1360 } 1361 resp, md, err := local_request_Health_GetVersion_0(rctx, inboundMarshaler, server, req, pathParams) 1362 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1363 ctx = runtime.NewServerMetadataContext(ctx, md) 1364 if err != nil { 1365 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1366 return 1367 } 1368 1369 forward_Health_GetVersion_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1370 1371 }) 1372 1373 mux.Handle("GET", pattern_Health_StreamBeaconLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1374 err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport") 1375 _, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1376 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1377 return 1378 }) 1379 1380 mux.Handle("GET", pattern_Health_StreamValidatorLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1381 err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport") 1382 _, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1383 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1384 return 1385 }) 1386 1387 return nil 1388 } 1389 1390 // RegisterAuthHandlerServer registers the http handlers for service Auth to "mux". 1391 // UnaryRPC :call AuthServer directly. 1392 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 1393 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterAuthHandlerFromEndpoint instead. 1394 func RegisterAuthHandlerServer(ctx context.Context, mux *runtime.ServeMux, server AuthServer) error { 1395 1396 mux.Handle("GET", pattern_Auth_HasUsedWeb_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1397 ctx, cancel := context.WithCancel(req.Context()) 1398 defer cancel() 1399 var stream runtime.ServerTransportStream 1400 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1401 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1402 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/HasUsedWeb") 1403 if err != nil { 1404 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1405 return 1406 } 1407 resp, md, err := local_request_Auth_HasUsedWeb_0(rctx, inboundMarshaler, server, req, pathParams) 1408 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1409 ctx = runtime.NewServerMetadataContext(ctx, md) 1410 if err != nil { 1411 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1412 return 1413 } 1414 1415 forward_Auth_HasUsedWeb_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1416 1417 }) 1418 1419 mux.Handle("POST", pattern_Auth_Login_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1420 ctx, cancel := context.WithCancel(req.Context()) 1421 defer cancel() 1422 var stream runtime.ServerTransportStream 1423 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1424 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1425 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Login") 1426 if err != nil { 1427 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1428 return 1429 } 1430 resp, md, err := local_request_Auth_Login_0(rctx, inboundMarshaler, server, req, pathParams) 1431 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1432 ctx = runtime.NewServerMetadataContext(ctx, md) 1433 if err != nil { 1434 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1435 return 1436 } 1437 1438 forward_Auth_Login_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1439 1440 }) 1441 1442 mux.Handle("POST", pattern_Auth_Signup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1443 ctx, cancel := context.WithCancel(req.Context()) 1444 defer cancel() 1445 var stream runtime.ServerTransportStream 1446 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1447 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1448 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Signup") 1449 if err != nil { 1450 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1451 return 1452 } 1453 resp, md, err := local_request_Auth_Signup_0(rctx, inboundMarshaler, server, req, pathParams) 1454 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1455 ctx = runtime.NewServerMetadataContext(ctx, md) 1456 if err != nil { 1457 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1458 return 1459 } 1460 1461 forward_Auth_Signup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1462 1463 }) 1464 1465 mux.Handle("POST", pattern_Auth_Logout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1466 ctx, cancel := context.WithCancel(req.Context()) 1467 defer cancel() 1468 var stream runtime.ServerTransportStream 1469 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 1470 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1471 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Logout") 1472 if err != nil { 1473 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1474 return 1475 } 1476 resp, md, err := local_request_Auth_Logout_0(rctx, inboundMarshaler, server, req, pathParams) 1477 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 1478 ctx = runtime.NewServerMetadataContext(ctx, md) 1479 if err != nil { 1480 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1481 return 1482 } 1483 1484 forward_Auth_Logout_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1485 1486 }) 1487 1488 return nil 1489 } 1490 1491 // RegisterWalletHandlerFromEndpoint is same as RegisterWalletHandler but 1492 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1493 func RegisterWalletHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1494 conn, err := grpc.Dial(endpoint, opts...) 1495 if err != nil { 1496 return err 1497 } 1498 defer func() { 1499 if err != nil { 1500 if cerr := conn.Close(); cerr != nil { 1501 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1502 } 1503 return 1504 } 1505 go func() { 1506 <-ctx.Done() 1507 if cerr := conn.Close(); cerr != nil { 1508 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1509 } 1510 }() 1511 }() 1512 1513 return RegisterWalletHandler(ctx, mux, conn) 1514 } 1515 1516 // RegisterWalletHandler registers the http handlers for service Wallet to "mux". 1517 // The handlers forward requests to the grpc endpoint over "conn". 1518 func RegisterWalletHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1519 return RegisterWalletHandlerClient(ctx, mux, NewWalletClient(conn)) 1520 } 1521 1522 // RegisterWalletHandlerClient registers the http handlers for service Wallet 1523 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WalletClient". 1524 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WalletClient" 1525 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1526 // "WalletClient" to call the correct interceptors. 1527 func RegisterWalletHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WalletClient) error { 1528 1529 mux.Handle("POST", pattern_Wallet_CreateWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1530 ctx, cancel := context.WithCancel(req.Context()) 1531 defer cancel() 1532 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1533 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/CreateWallet") 1534 if err != nil { 1535 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1536 return 1537 } 1538 resp, md, err := request_Wallet_CreateWallet_0(rctx, inboundMarshaler, client, req, pathParams) 1539 ctx = runtime.NewServerMetadataContext(ctx, md) 1540 if err != nil { 1541 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1542 return 1543 } 1544 1545 forward_Wallet_CreateWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1546 1547 }) 1548 1549 mux.Handle("GET", pattern_Wallet_WalletConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1550 ctx, cancel := context.WithCancel(req.Context()) 1551 defer cancel() 1552 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1553 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/WalletConfig") 1554 if err != nil { 1555 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1556 return 1557 } 1558 resp, md, err := request_Wallet_WalletConfig_0(rctx, inboundMarshaler, client, req, pathParams) 1559 ctx = runtime.NewServerMetadataContext(ctx, md) 1560 if err != nil { 1561 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1562 return 1563 } 1564 1565 forward_Wallet_WalletConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1566 1567 }) 1568 1569 mux.Handle("GET", pattern_Wallet_GenerateMnemonic_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1570 ctx, cancel := context.WithCancel(req.Context()) 1571 defer cancel() 1572 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1573 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/GenerateMnemonic") 1574 if err != nil { 1575 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1576 return 1577 } 1578 resp, md, err := request_Wallet_GenerateMnemonic_0(rctx, inboundMarshaler, client, req, pathParams) 1579 ctx = runtime.NewServerMetadataContext(ctx, md) 1580 if err != nil { 1581 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1582 return 1583 } 1584 1585 forward_Wallet_GenerateMnemonic_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1586 1587 }) 1588 1589 mux.Handle("POST", pattern_Wallet_ImportKeystores_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1590 ctx, cancel := context.WithCancel(req.Context()) 1591 defer cancel() 1592 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1593 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/ImportKeystores") 1594 if err != nil { 1595 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1596 return 1597 } 1598 resp, md, err := request_Wallet_ImportKeystores_0(rctx, inboundMarshaler, client, req, pathParams) 1599 ctx = runtime.NewServerMetadataContext(ctx, md) 1600 if err != nil { 1601 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1602 return 1603 } 1604 1605 forward_Wallet_ImportKeystores_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1606 1607 }) 1608 1609 mux.Handle("POST", pattern_Wallet_RecoverWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1610 ctx, cancel := context.WithCancel(req.Context()) 1611 defer cancel() 1612 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1613 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/RecoverWallet") 1614 if err != nil { 1615 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1616 return 1617 } 1618 resp, md, err := request_Wallet_RecoverWallet_0(rctx, inboundMarshaler, client, req, pathParams) 1619 ctx = runtime.NewServerMetadataContext(ctx, md) 1620 if err != nil { 1621 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1622 return 1623 } 1624 1625 forward_Wallet_RecoverWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1626 1627 }) 1628 1629 return nil 1630 } 1631 1632 var ( 1633 pattern_Wallet_CreateWallet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "wallet", "create"}, "")) 1634 1635 pattern_Wallet_WalletConfig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "wallet"}, "")) 1636 1637 pattern_Wallet_GenerateMnemonic_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "mnemonic", "generate"}, "")) 1638 1639 pattern_Wallet_ImportKeystores_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "wallet", "keystores", "import"}, "")) 1640 1641 pattern_Wallet_RecoverWallet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "wallet", "recover"}, "")) 1642 ) 1643 1644 var ( 1645 forward_Wallet_CreateWallet_0 = runtime.ForwardResponseMessage 1646 1647 forward_Wallet_WalletConfig_0 = runtime.ForwardResponseMessage 1648 1649 forward_Wallet_GenerateMnemonic_0 = runtime.ForwardResponseMessage 1650 1651 forward_Wallet_ImportKeystores_0 = runtime.ForwardResponseMessage 1652 1653 forward_Wallet_RecoverWallet_0 = runtime.ForwardResponseMessage 1654 ) 1655 1656 // RegisterAccountsHandlerFromEndpoint is same as RegisterAccountsHandler but 1657 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1658 func RegisterAccountsHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1659 conn, err := grpc.Dial(endpoint, opts...) 1660 if err != nil { 1661 return err 1662 } 1663 defer func() { 1664 if err != nil { 1665 if cerr := conn.Close(); cerr != nil { 1666 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1667 } 1668 return 1669 } 1670 go func() { 1671 <-ctx.Done() 1672 if cerr := conn.Close(); cerr != nil { 1673 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1674 } 1675 }() 1676 }() 1677 1678 return RegisterAccountsHandler(ctx, mux, conn) 1679 } 1680 1681 // RegisterAccountsHandler registers the http handlers for service Accounts to "mux". 1682 // The handlers forward requests to the grpc endpoint over "conn". 1683 func RegisterAccountsHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1684 return RegisterAccountsHandlerClient(ctx, mux, NewAccountsClient(conn)) 1685 } 1686 1687 // RegisterAccountsHandlerClient registers the http handlers for service Accounts 1688 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AccountsClient". 1689 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AccountsClient" 1690 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1691 // "AccountsClient" to call the correct interceptors. 1692 func RegisterAccountsHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AccountsClient) error { 1693 1694 mux.Handle("GET", pattern_Accounts_ListAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1695 ctx, cancel := context.WithCancel(req.Context()) 1696 defer cancel() 1697 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1698 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ListAccounts") 1699 if err != nil { 1700 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1701 return 1702 } 1703 resp, md, err := request_Accounts_ListAccounts_0(rctx, inboundMarshaler, client, req, pathParams) 1704 ctx = runtime.NewServerMetadataContext(ctx, md) 1705 if err != nil { 1706 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1707 return 1708 } 1709 1710 forward_Accounts_ListAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1711 1712 }) 1713 1714 mux.Handle("POST", pattern_Accounts_BackupAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1715 ctx, cancel := context.WithCancel(req.Context()) 1716 defer cancel() 1717 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1718 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/BackupAccounts") 1719 if err != nil { 1720 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1721 return 1722 } 1723 resp, md, err := request_Accounts_BackupAccounts_0(rctx, inboundMarshaler, client, req, pathParams) 1724 ctx = runtime.NewServerMetadataContext(ctx, md) 1725 if err != nil { 1726 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1727 return 1728 } 1729 1730 forward_Accounts_BackupAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1731 1732 }) 1733 1734 mux.Handle("POST", pattern_Accounts_DeleteAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1735 ctx, cancel := context.WithCancel(req.Context()) 1736 defer cancel() 1737 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1738 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/DeleteAccounts") 1739 if err != nil { 1740 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1741 return 1742 } 1743 resp, md, err := request_Accounts_DeleteAccounts_0(rctx, inboundMarshaler, client, req, pathParams) 1744 ctx = runtime.NewServerMetadataContext(ctx, md) 1745 if err != nil { 1746 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1747 return 1748 } 1749 1750 forward_Accounts_DeleteAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1751 1752 }) 1753 1754 mux.Handle("POST", pattern_Accounts_ChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1755 ctx, cancel := context.WithCancel(req.Context()) 1756 defer cancel() 1757 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1758 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ChangePassword") 1759 if err != nil { 1760 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1761 return 1762 } 1763 resp, md, err := request_Accounts_ChangePassword_0(rctx, inboundMarshaler, client, req, pathParams) 1764 ctx = runtime.NewServerMetadataContext(ctx, md) 1765 if err != nil { 1766 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1767 return 1768 } 1769 1770 forward_Accounts_ChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1771 1772 }) 1773 1774 mux.Handle("POST", pattern_Accounts_VoluntaryExit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1775 ctx, cancel := context.WithCancel(req.Context()) 1776 defer cancel() 1777 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1778 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/VoluntaryExit") 1779 if err != nil { 1780 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1781 return 1782 } 1783 resp, md, err := request_Accounts_VoluntaryExit_0(rctx, inboundMarshaler, client, req, pathParams) 1784 ctx = runtime.NewServerMetadataContext(ctx, md) 1785 if err != nil { 1786 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1787 return 1788 } 1789 1790 forward_Accounts_VoluntaryExit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1791 1792 }) 1793 1794 return nil 1795 } 1796 1797 var ( 1798 pattern_Accounts_ListAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "accounts"}, "")) 1799 1800 pattern_Accounts_BackupAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "accounts", "backup"}, "")) 1801 1802 pattern_Accounts_DeleteAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "wallet", "accounts", "delete"}, "")) 1803 1804 pattern_Accounts_ChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "password", "edit"}, "")) 1805 1806 pattern_Accounts_VoluntaryExit_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "accounts", "voluntary-exit"}, "")) 1807 ) 1808 1809 var ( 1810 forward_Accounts_ListAccounts_0 = runtime.ForwardResponseMessage 1811 1812 forward_Accounts_BackupAccounts_0 = runtime.ForwardResponseMessage 1813 1814 forward_Accounts_DeleteAccounts_0 = runtime.ForwardResponseMessage 1815 1816 forward_Accounts_ChangePassword_0 = runtime.ForwardResponseMessage 1817 1818 forward_Accounts_VoluntaryExit_0 = runtime.ForwardResponseMessage 1819 ) 1820 1821 // RegisterBeaconHandlerFromEndpoint is same as RegisterBeaconHandler but 1822 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1823 func RegisterBeaconHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1824 conn, err := grpc.Dial(endpoint, opts...) 1825 if err != nil { 1826 return err 1827 } 1828 defer func() { 1829 if err != nil { 1830 if cerr := conn.Close(); cerr != nil { 1831 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1832 } 1833 return 1834 } 1835 go func() { 1836 <-ctx.Done() 1837 if cerr := conn.Close(); cerr != nil { 1838 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 1839 } 1840 }() 1841 }() 1842 1843 return RegisterBeaconHandler(ctx, mux, conn) 1844 } 1845 1846 // RegisterBeaconHandler registers the http handlers for service Beacon to "mux". 1847 // The handlers forward requests to the grpc endpoint over "conn". 1848 func RegisterBeaconHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1849 return RegisterBeaconHandlerClient(ctx, mux, NewBeaconClient(conn)) 1850 } 1851 1852 // RegisterBeaconHandlerClient registers the http handlers for service Beacon 1853 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BeaconClient". 1854 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BeaconClient" 1855 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1856 // "BeaconClient" to call the correct interceptors. 1857 func RegisterBeaconHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BeaconClient) error { 1858 1859 mux.Handle("GET", pattern_Beacon_GetBeaconStatus_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1860 ctx, cancel := context.WithCancel(req.Context()) 1861 defer cancel() 1862 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1863 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetBeaconStatus") 1864 if err != nil { 1865 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1866 return 1867 } 1868 resp, md, err := request_Beacon_GetBeaconStatus_0(rctx, inboundMarshaler, client, req, pathParams) 1869 ctx = runtime.NewServerMetadataContext(ctx, md) 1870 if err != nil { 1871 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1872 return 1873 } 1874 1875 forward_Beacon_GetBeaconStatus_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1876 1877 }) 1878 1879 mux.Handle("GET", pattern_Beacon_GetValidatorParticipation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1880 ctx, cancel := context.WithCancel(req.Context()) 1881 defer cancel() 1882 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1883 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorParticipation") 1884 if err != nil { 1885 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1886 return 1887 } 1888 resp, md, err := request_Beacon_GetValidatorParticipation_0(rctx, inboundMarshaler, client, req, pathParams) 1889 ctx = runtime.NewServerMetadataContext(ctx, md) 1890 if err != nil { 1891 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1892 return 1893 } 1894 1895 forward_Beacon_GetValidatorParticipation_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1896 1897 }) 1898 1899 mux.Handle("GET", pattern_Beacon_GetValidatorPerformance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1900 ctx, cancel := context.WithCancel(req.Context()) 1901 defer cancel() 1902 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1903 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorPerformance") 1904 if err != nil { 1905 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1906 return 1907 } 1908 resp, md, err := request_Beacon_GetValidatorPerformance_0(rctx, inboundMarshaler, client, req, pathParams) 1909 ctx = runtime.NewServerMetadataContext(ctx, md) 1910 if err != nil { 1911 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1912 return 1913 } 1914 1915 forward_Beacon_GetValidatorPerformance_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1916 1917 }) 1918 1919 mux.Handle("GET", pattern_Beacon_GetValidators_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1920 ctx, cancel := context.WithCancel(req.Context()) 1921 defer cancel() 1922 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1923 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidators") 1924 if err != nil { 1925 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1926 return 1927 } 1928 resp, md, err := request_Beacon_GetValidators_0(rctx, inboundMarshaler, client, req, pathParams) 1929 ctx = runtime.NewServerMetadataContext(ctx, md) 1930 if err != nil { 1931 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1932 return 1933 } 1934 1935 forward_Beacon_GetValidators_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1936 1937 }) 1938 1939 mux.Handle("GET", pattern_Beacon_GetValidatorBalances_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1940 ctx, cancel := context.WithCancel(req.Context()) 1941 defer cancel() 1942 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1943 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorBalances") 1944 if err != nil { 1945 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1946 return 1947 } 1948 resp, md, err := request_Beacon_GetValidatorBalances_0(rctx, inboundMarshaler, client, req, pathParams) 1949 ctx = runtime.NewServerMetadataContext(ctx, md) 1950 if err != nil { 1951 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1952 return 1953 } 1954 1955 forward_Beacon_GetValidatorBalances_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1956 1957 }) 1958 1959 mux.Handle("GET", pattern_Beacon_GetValidatorQueue_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1960 ctx, cancel := context.WithCancel(req.Context()) 1961 defer cancel() 1962 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1963 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorQueue") 1964 if err != nil { 1965 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1966 return 1967 } 1968 resp, md, err := request_Beacon_GetValidatorQueue_0(rctx, inboundMarshaler, client, req, pathParams) 1969 ctx = runtime.NewServerMetadataContext(ctx, md) 1970 if err != nil { 1971 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1972 return 1973 } 1974 1975 forward_Beacon_GetValidatorQueue_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1976 1977 }) 1978 1979 mux.Handle("GET", pattern_Beacon_GetPeers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1980 ctx, cancel := context.WithCancel(req.Context()) 1981 defer cancel() 1982 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1983 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetPeers") 1984 if err != nil { 1985 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1986 return 1987 } 1988 resp, md, err := request_Beacon_GetPeers_0(rctx, inboundMarshaler, client, req, pathParams) 1989 ctx = runtime.NewServerMetadataContext(ctx, md) 1990 if err != nil { 1991 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1992 return 1993 } 1994 1995 forward_Beacon_GetPeers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1996 1997 }) 1998 1999 return nil 2000 } 2001 2002 var ( 2003 pattern_Beacon_GetBeaconStatus_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "status"}, "")) 2004 2005 pattern_Beacon_GetValidatorParticipation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "participation"}, "")) 2006 2007 pattern_Beacon_GetValidatorPerformance_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "performance"}, "")) 2008 2009 pattern_Beacon_GetValidators_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "validators"}, "")) 2010 2011 pattern_Beacon_GetValidatorBalances_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "balances"}, "")) 2012 2013 pattern_Beacon_GetValidatorQueue_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "queue"}, "")) 2014 2015 pattern_Beacon_GetPeers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "peers"}, "")) 2016 ) 2017 2018 var ( 2019 forward_Beacon_GetBeaconStatus_0 = runtime.ForwardResponseMessage 2020 2021 forward_Beacon_GetValidatorParticipation_0 = runtime.ForwardResponseMessage 2022 2023 forward_Beacon_GetValidatorPerformance_0 = runtime.ForwardResponseMessage 2024 2025 forward_Beacon_GetValidators_0 = runtime.ForwardResponseMessage 2026 2027 forward_Beacon_GetValidatorBalances_0 = runtime.ForwardResponseMessage 2028 2029 forward_Beacon_GetValidatorQueue_0 = runtime.ForwardResponseMessage 2030 2031 forward_Beacon_GetPeers_0 = runtime.ForwardResponseMessage 2032 ) 2033 2034 // RegisterSlashingProtectionHandlerFromEndpoint is same as RegisterSlashingProtectionHandler but 2035 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 2036 func RegisterSlashingProtectionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 2037 conn, err := grpc.Dial(endpoint, opts...) 2038 if err != nil { 2039 return err 2040 } 2041 defer func() { 2042 if err != nil { 2043 if cerr := conn.Close(); cerr != nil { 2044 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2045 } 2046 return 2047 } 2048 go func() { 2049 <-ctx.Done() 2050 if cerr := conn.Close(); cerr != nil { 2051 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2052 } 2053 }() 2054 }() 2055 2056 return RegisterSlashingProtectionHandler(ctx, mux, conn) 2057 } 2058 2059 // RegisterSlashingProtectionHandler registers the http handlers for service SlashingProtection to "mux". 2060 // The handlers forward requests to the grpc endpoint over "conn". 2061 func RegisterSlashingProtectionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 2062 return RegisterSlashingProtectionHandlerClient(ctx, mux, NewSlashingProtectionClient(conn)) 2063 } 2064 2065 // RegisterSlashingProtectionHandlerClient registers the http handlers for service SlashingProtection 2066 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SlashingProtectionClient". 2067 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SlashingProtectionClient" 2068 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 2069 // "SlashingProtectionClient" to call the correct interceptors. 2070 func RegisterSlashingProtectionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SlashingProtectionClient) error { 2071 2072 mux.Handle("POST", pattern_SlashingProtection_ExportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2073 ctx, cancel := context.WithCancel(req.Context()) 2074 defer cancel() 2075 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2076 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ExportSlashingProtection") 2077 if err != nil { 2078 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2079 return 2080 } 2081 resp, md, err := request_SlashingProtection_ExportSlashingProtection_0(rctx, inboundMarshaler, client, req, pathParams) 2082 ctx = runtime.NewServerMetadataContext(ctx, md) 2083 if err != nil { 2084 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2085 return 2086 } 2087 2088 forward_SlashingProtection_ExportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2089 2090 }) 2091 2092 mux.Handle("POST", pattern_SlashingProtection_ImportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2093 ctx, cancel := context.WithCancel(req.Context()) 2094 defer cancel() 2095 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2096 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ImportSlashingProtection") 2097 if err != nil { 2098 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2099 return 2100 } 2101 resp, md, err := request_SlashingProtection_ImportSlashingProtection_0(rctx, inboundMarshaler, client, req, pathParams) 2102 ctx = runtime.NewServerMetadataContext(ctx, md) 2103 if err != nil { 2104 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2105 return 2106 } 2107 2108 forward_SlashingProtection_ImportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2109 2110 }) 2111 2112 return nil 2113 } 2114 2115 var ( 2116 pattern_SlashingProtection_ExportSlashingProtection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "slashing-protection", "export"}, "")) 2117 2118 pattern_SlashingProtection_ImportSlashingProtection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "slashing-protection", "import"}, "")) 2119 ) 2120 2121 var ( 2122 forward_SlashingProtection_ExportSlashingProtection_0 = runtime.ForwardResponseMessage 2123 2124 forward_SlashingProtection_ImportSlashingProtection_0 = runtime.ForwardResponseMessage 2125 ) 2126 2127 // RegisterHealthHandlerFromEndpoint is same as RegisterHealthHandler but 2128 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 2129 func RegisterHealthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 2130 conn, err := grpc.Dial(endpoint, opts...) 2131 if err != nil { 2132 return err 2133 } 2134 defer func() { 2135 if err != nil { 2136 if cerr := conn.Close(); cerr != nil { 2137 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2138 } 2139 return 2140 } 2141 go func() { 2142 <-ctx.Done() 2143 if cerr := conn.Close(); cerr != nil { 2144 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2145 } 2146 }() 2147 }() 2148 2149 return RegisterHealthHandler(ctx, mux, conn) 2150 } 2151 2152 // RegisterHealthHandler registers the http handlers for service Health to "mux". 2153 // The handlers forward requests to the grpc endpoint over "conn". 2154 func RegisterHealthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 2155 return RegisterHealthHandlerClient(ctx, mux, NewHealthClient(conn)) 2156 } 2157 2158 // RegisterHealthHandlerClient registers the http handlers for service Health 2159 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "HealthClient". 2160 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "HealthClient" 2161 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 2162 // "HealthClient" to call the correct interceptors. 2163 func RegisterHealthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client HealthClient) error { 2164 2165 mux.Handle("GET", pattern_Health_GetBeaconNodeConnection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2166 ctx, cancel := context.WithCancel(req.Context()) 2167 defer cancel() 2168 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2169 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetBeaconNodeConnection") 2170 if err != nil { 2171 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2172 return 2173 } 2174 resp, md, err := request_Health_GetBeaconNodeConnection_0(rctx, inboundMarshaler, client, req, pathParams) 2175 ctx = runtime.NewServerMetadataContext(ctx, md) 2176 if err != nil { 2177 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2178 return 2179 } 2180 2181 forward_Health_GetBeaconNodeConnection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2182 2183 }) 2184 2185 mux.Handle("GET", pattern_Health_GetLogsEndpoints_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2186 ctx, cancel := context.WithCancel(req.Context()) 2187 defer cancel() 2188 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2189 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetLogsEndpoints") 2190 if err != nil { 2191 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2192 return 2193 } 2194 resp, md, err := request_Health_GetLogsEndpoints_0(rctx, inboundMarshaler, client, req, pathParams) 2195 ctx = runtime.NewServerMetadataContext(ctx, md) 2196 if err != nil { 2197 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2198 return 2199 } 2200 2201 forward_Health_GetLogsEndpoints_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2202 2203 }) 2204 2205 mux.Handle("GET", pattern_Health_GetVersion_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2206 ctx, cancel := context.WithCancel(req.Context()) 2207 defer cancel() 2208 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2209 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetVersion") 2210 if err != nil { 2211 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2212 return 2213 } 2214 resp, md, err := request_Health_GetVersion_0(rctx, inboundMarshaler, client, req, pathParams) 2215 ctx = runtime.NewServerMetadataContext(ctx, md) 2216 if err != nil { 2217 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2218 return 2219 } 2220 2221 forward_Health_GetVersion_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2222 2223 }) 2224 2225 mux.Handle("GET", pattern_Health_StreamBeaconLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2226 ctx, cancel := context.WithCancel(req.Context()) 2227 defer cancel() 2228 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2229 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/StreamBeaconLogs") 2230 if err != nil { 2231 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2232 return 2233 } 2234 resp, md, err := request_Health_StreamBeaconLogs_0(rctx, inboundMarshaler, client, req, pathParams) 2235 ctx = runtime.NewServerMetadataContext(ctx, md) 2236 if err != nil { 2237 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2238 return 2239 } 2240 2241 forward_Health_StreamBeaconLogs_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 2242 2243 }) 2244 2245 mux.Handle("GET", pattern_Health_StreamValidatorLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2246 ctx, cancel := context.WithCancel(req.Context()) 2247 defer cancel() 2248 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2249 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/StreamValidatorLogs") 2250 if err != nil { 2251 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2252 return 2253 } 2254 resp, md, err := request_Health_StreamValidatorLogs_0(rctx, inboundMarshaler, client, req, pathParams) 2255 ctx = runtime.NewServerMetadataContext(ctx, md) 2256 if err != nil { 2257 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2258 return 2259 } 2260 2261 forward_Health_StreamValidatorLogs_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 2262 2263 }) 2264 2265 return nil 2266 } 2267 2268 var ( 2269 pattern_Health_GetBeaconNodeConnection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "health", "node_connection"}, "")) 2270 2271 pattern_Health_GetLogsEndpoints_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "health", "logs", "endpoints"}, "")) 2272 2273 pattern_Health_GetVersion_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "health", "version"}, "")) 2274 2275 pattern_Health_StreamBeaconLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4, 2, 5}, []string{"v2", "validator", "health", "logs", "beacon", "stream"}, "")) 2276 2277 pattern_Health_StreamValidatorLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 1, 2, 4}, []string{"v2", "validator", "health", "logs", "stream"}, "")) 2278 ) 2279 2280 var ( 2281 forward_Health_GetBeaconNodeConnection_0 = runtime.ForwardResponseMessage 2282 2283 forward_Health_GetLogsEndpoints_0 = runtime.ForwardResponseMessage 2284 2285 forward_Health_GetVersion_0 = runtime.ForwardResponseMessage 2286 2287 forward_Health_StreamBeaconLogs_0 = runtime.ForwardResponseStream 2288 2289 forward_Health_StreamValidatorLogs_0 = runtime.ForwardResponseStream 2290 ) 2291 2292 // RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but 2293 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 2294 func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 2295 conn, err := grpc.Dial(endpoint, opts...) 2296 if err != nil { 2297 return err 2298 } 2299 defer func() { 2300 if err != nil { 2301 if cerr := conn.Close(); cerr != nil { 2302 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2303 } 2304 return 2305 } 2306 go func() { 2307 <-ctx.Done() 2308 if cerr := conn.Close(); cerr != nil { 2309 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 2310 } 2311 }() 2312 }() 2313 2314 return RegisterAuthHandler(ctx, mux, conn) 2315 } 2316 2317 // RegisterAuthHandler registers the http handlers for service Auth to "mux". 2318 // The handlers forward requests to the grpc endpoint over "conn". 2319 func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 2320 return RegisterAuthHandlerClient(ctx, mux, NewAuthClient(conn)) 2321 } 2322 2323 // RegisterAuthHandlerClient registers the http handlers for service Auth 2324 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient". 2325 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient" 2326 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 2327 // "AuthClient" to call the correct interceptors. 2328 func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthClient) error { 2329 2330 mux.Handle("GET", pattern_Auth_HasUsedWeb_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2331 ctx, cancel := context.WithCancel(req.Context()) 2332 defer cancel() 2333 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2334 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/HasUsedWeb") 2335 if err != nil { 2336 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2337 return 2338 } 2339 resp, md, err := request_Auth_HasUsedWeb_0(rctx, inboundMarshaler, client, req, pathParams) 2340 ctx = runtime.NewServerMetadataContext(ctx, md) 2341 if err != nil { 2342 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2343 return 2344 } 2345 2346 forward_Auth_HasUsedWeb_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2347 2348 }) 2349 2350 mux.Handle("POST", pattern_Auth_Login_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2351 ctx, cancel := context.WithCancel(req.Context()) 2352 defer cancel() 2353 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2354 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Login") 2355 if err != nil { 2356 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2357 return 2358 } 2359 resp, md, err := request_Auth_Login_0(rctx, inboundMarshaler, client, req, pathParams) 2360 ctx = runtime.NewServerMetadataContext(ctx, md) 2361 if err != nil { 2362 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2363 return 2364 } 2365 2366 forward_Auth_Login_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2367 2368 }) 2369 2370 mux.Handle("POST", pattern_Auth_Signup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2371 ctx, cancel := context.WithCancel(req.Context()) 2372 defer cancel() 2373 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2374 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Signup") 2375 if err != nil { 2376 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2377 return 2378 } 2379 resp, md, err := request_Auth_Signup_0(rctx, inboundMarshaler, client, req, pathParams) 2380 ctx = runtime.NewServerMetadataContext(ctx, md) 2381 if err != nil { 2382 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2383 return 2384 } 2385 2386 forward_Auth_Signup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2387 2388 }) 2389 2390 mux.Handle("POST", pattern_Auth_Logout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2391 ctx, cancel := context.WithCancel(req.Context()) 2392 defer cancel() 2393 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2394 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Logout") 2395 if err != nil { 2396 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2397 return 2398 } 2399 resp, md, err := request_Auth_Logout_0(rctx, inboundMarshaler, client, req, pathParams) 2400 ctx = runtime.NewServerMetadataContext(ctx, md) 2401 if err != nil { 2402 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2403 return 2404 } 2405 2406 forward_Auth_Logout_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2407 2408 }) 2409 2410 return nil 2411 } 2412 2413 var ( 2414 pattern_Auth_HasUsedWeb_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "initialized"}, "")) 2415 2416 pattern_Auth_Login_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "login"}, "")) 2417 2418 pattern_Auth_Signup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "signup"}, "")) 2419 2420 pattern_Auth_Logout_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "logout"}, "")) 2421 ) 2422 2423 var ( 2424 forward_Auth_HasUsedWeb_0 = runtime.ForwardResponseMessage 2425 2426 forward_Auth_Login_0 = runtime.ForwardResponseMessage 2427 2428 forward_Auth_Signup_0 = runtime.ForwardResponseMessage 2429 2430 forward_Auth_Logout_0 = runtime.ForwardResponseMessage 2431 )