github.com/prysmaticlabs/prysm@v1.4.4/proto/validator/accounts/v2/web_api.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: proto/validator/accounts/v2/web_api.proto
     3  
     4  /*
     5  Package ethereum_validator_accounts_v2 is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package ethereum_validator_accounts_v2
    10  
    11  import (
    12  	"context"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/golang/protobuf/ptypes/empty"
    17  	emptypb "github.com/golang/protobuf/ptypes/empty"
    18  	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
    19  	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
    20  	github_com_prysmaticlabs_eth2_types "github.com/prysmaticlabs/eth2-types"
    21  	eth "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
    22  	"google.golang.org/grpc"
    23  	"google.golang.org/grpc/codes"
    24  	"google.golang.org/grpc/grpclog"
    25  	"google.golang.org/grpc/metadata"
    26  	"google.golang.org/grpc/status"
    27  	"google.golang.org/protobuf/proto"
    28  )
    29  
    30  // Suppress "imported and not used" errors
    31  var _ codes.Code
    32  var _ io.Reader
    33  var _ status.Status
    34  var _ = runtime.String
    35  var _ = utilities.NewDoubleArray
    36  var _ = metadata.Join
    37  var _ = github_com_prysmaticlabs_eth2_types.Epoch(0)
    38  var _ = emptypb.Empty{}
    39  var _ = empty.Empty{}
    40  
    41  func request_Wallet_CreateWallet_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    42  	var protoReq CreateWalletRequest
    43  	var metadata runtime.ServerMetadata
    44  
    45  	newReader, berr := utilities.IOReaderFactory(req.Body)
    46  	if berr != nil {
    47  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    48  	}
    49  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    50  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    51  	}
    52  
    53  	msg, err := client.CreateWallet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    54  	return msg, metadata, err
    55  
    56  }
    57  
    58  func local_request_Wallet_CreateWallet_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    59  	var protoReq CreateWalletRequest
    60  	var metadata runtime.ServerMetadata
    61  
    62  	newReader, berr := utilities.IOReaderFactory(req.Body)
    63  	if berr != nil {
    64  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
    65  	}
    66  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
    67  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    68  	}
    69  
    70  	msg, err := server.CreateWallet(ctx, &protoReq)
    71  	return msg, metadata, err
    72  
    73  }
    74  
    75  func request_Wallet_WalletConfig_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    76  	var protoReq emptypb.Empty
    77  	var metadata runtime.ServerMetadata
    78  
    79  	msg, err := client.WalletConfig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    80  	return msg, metadata, err
    81  
    82  }
    83  
    84  func local_request_Wallet_WalletConfig_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    85  	var protoReq emptypb.Empty
    86  	var metadata runtime.ServerMetadata
    87  
    88  	msg, err := server.WalletConfig(ctx, &protoReq)
    89  	return msg, metadata, err
    90  
    91  }
    92  
    93  func request_Wallet_GenerateMnemonic_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    94  	var protoReq emptypb.Empty
    95  	var metadata runtime.ServerMetadata
    96  
    97  	msg, err := client.GenerateMnemonic(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    98  	return msg, metadata, err
    99  
   100  }
   101  
   102  func local_request_Wallet_GenerateMnemonic_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   103  	var protoReq emptypb.Empty
   104  	var metadata runtime.ServerMetadata
   105  
   106  	msg, err := server.GenerateMnemonic(ctx, &protoReq)
   107  	return msg, metadata, err
   108  
   109  }
   110  
   111  func request_Wallet_ImportKeystores_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   112  	var protoReq ImportKeystoresRequest
   113  	var metadata runtime.ServerMetadata
   114  
   115  	newReader, berr := utilities.IOReaderFactory(req.Body)
   116  	if berr != nil {
   117  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   118  	}
   119  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   120  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   121  	}
   122  
   123  	msg, err := client.ImportKeystores(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   124  	return msg, metadata, err
   125  
   126  }
   127  
   128  func local_request_Wallet_ImportKeystores_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   129  	var protoReq ImportKeystoresRequest
   130  	var metadata runtime.ServerMetadata
   131  
   132  	newReader, berr := utilities.IOReaderFactory(req.Body)
   133  	if berr != nil {
   134  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   135  	}
   136  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   137  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   138  	}
   139  
   140  	msg, err := server.ImportKeystores(ctx, &protoReq)
   141  	return msg, metadata, err
   142  
   143  }
   144  
   145  func request_Wallet_RecoverWallet_0(ctx context.Context, marshaler runtime.Marshaler, client WalletClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   146  	var protoReq RecoverWalletRequest
   147  	var metadata runtime.ServerMetadata
   148  
   149  	newReader, berr := utilities.IOReaderFactory(req.Body)
   150  	if berr != nil {
   151  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   152  	}
   153  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   154  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   155  	}
   156  
   157  	msg, err := client.RecoverWallet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   158  	return msg, metadata, err
   159  
   160  }
   161  
   162  func local_request_Wallet_RecoverWallet_0(ctx context.Context, marshaler runtime.Marshaler, server WalletServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   163  	var protoReq RecoverWalletRequest
   164  	var metadata runtime.ServerMetadata
   165  
   166  	newReader, berr := utilities.IOReaderFactory(req.Body)
   167  	if berr != nil {
   168  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   169  	}
   170  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   171  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   172  	}
   173  
   174  	msg, err := server.RecoverWallet(ctx, &protoReq)
   175  	return msg, metadata, err
   176  
   177  }
   178  
   179  var (
   180  	filter_Accounts_ListAccounts_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
   181  )
   182  
   183  func request_Accounts_ListAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   184  	var protoReq ListAccountsRequest
   185  	var metadata runtime.ServerMetadata
   186  
   187  	if err := req.ParseForm(); err != nil {
   188  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   189  	}
   190  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Accounts_ListAccounts_0); err != nil {
   191  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   192  	}
   193  
   194  	msg, err := client.ListAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   195  	return msg, metadata, err
   196  
   197  }
   198  
   199  func local_request_Accounts_ListAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   200  	var protoReq ListAccountsRequest
   201  	var metadata runtime.ServerMetadata
   202  
   203  	if err := req.ParseForm(); err != nil {
   204  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   205  	}
   206  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Accounts_ListAccounts_0); err != nil {
   207  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   208  	}
   209  
   210  	msg, err := server.ListAccounts(ctx, &protoReq)
   211  	return msg, metadata, err
   212  
   213  }
   214  
   215  func request_Accounts_BackupAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   216  	var protoReq BackupAccountsRequest
   217  	var metadata runtime.ServerMetadata
   218  
   219  	newReader, berr := utilities.IOReaderFactory(req.Body)
   220  	if berr != nil {
   221  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   222  	}
   223  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   224  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   225  	}
   226  
   227  	msg, err := client.BackupAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   228  	return msg, metadata, err
   229  
   230  }
   231  
   232  func local_request_Accounts_BackupAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   233  	var protoReq BackupAccountsRequest
   234  	var metadata runtime.ServerMetadata
   235  
   236  	newReader, berr := utilities.IOReaderFactory(req.Body)
   237  	if berr != nil {
   238  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   239  	}
   240  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   241  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   242  	}
   243  
   244  	msg, err := server.BackupAccounts(ctx, &protoReq)
   245  	return msg, metadata, err
   246  
   247  }
   248  
   249  func request_Accounts_DeleteAccounts_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   250  	var protoReq DeleteAccountsRequest
   251  	var metadata runtime.ServerMetadata
   252  
   253  	newReader, berr := utilities.IOReaderFactory(req.Body)
   254  	if berr != nil {
   255  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   256  	}
   257  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   258  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   259  	}
   260  
   261  	msg, err := client.DeleteAccounts(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   262  	return msg, metadata, err
   263  
   264  }
   265  
   266  func local_request_Accounts_DeleteAccounts_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   267  	var protoReq DeleteAccountsRequest
   268  	var metadata runtime.ServerMetadata
   269  
   270  	newReader, berr := utilities.IOReaderFactory(req.Body)
   271  	if berr != nil {
   272  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   273  	}
   274  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   275  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   276  	}
   277  
   278  	msg, err := server.DeleteAccounts(ctx, &protoReq)
   279  	return msg, metadata, err
   280  
   281  }
   282  
   283  func request_Accounts_ChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   284  	var protoReq ChangePasswordRequest
   285  	var metadata runtime.ServerMetadata
   286  
   287  	newReader, berr := utilities.IOReaderFactory(req.Body)
   288  	if berr != nil {
   289  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   290  	}
   291  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   292  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   293  	}
   294  
   295  	msg, err := client.ChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   296  	return msg, metadata, err
   297  
   298  }
   299  
   300  func local_request_Accounts_ChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   301  	var protoReq ChangePasswordRequest
   302  	var metadata runtime.ServerMetadata
   303  
   304  	newReader, berr := utilities.IOReaderFactory(req.Body)
   305  	if berr != nil {
   306  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   307  	}
   308  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   309  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   310  	}
   311  
   312  	msg, err := server.ChangePassword(ctx, &protoReq)
   313  	return msg, metadata, err
   314  
   315  }
   316  
   317  func request_Accounts_VoluntaryExit_0(ctx context.Context, marshaler runtime.Marshaler, client AccountsClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   318  	var protoReq VoluntaryExitRequest
   319  	var metadata runtime.ServerMetadata
   320  
   321  	newReader, berr := utilities.IOReaderFactory(req.Body)
   322  	if berr != nil {
   323  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   324  	}
   325  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   326  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   327  	}
   328  
   329  	msg, err := client.VoluntaryExit(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   330  	return msg, metadata, err
   331  
   332  }
   333  
   334  func local_request_Accounts_VoluntaryExit_0(ctx context.Context, marshaler runtime.Marshaler, server AccountsServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   335  	var protoReq VoluntaryExitRequest
   336  	var metadata runtime.ServerMetadata
   337  
   338  	newReader, berr := utilities.IOReaderFactory(req.Body)
   339  	if berr != nil {
   340  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   341  	}
   342  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   343  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   344  	}
   345  
   346  	msg, err := server.VoluntaryExit(ctx, &protoReq)
   347  	return msg, metadata, err
   348  
   349  }
   350  
   351  func request_Beacon_GetBeaconStatus_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   352  	var protoReq emptypb.Empty
   353  	var metadata runtime.ServerMetadata
   354  
   355  	msg, err := client.GetBeaconStatus(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   356  	return msg, metadata, err
   357  
   358  }
   359  
   360  func local_request_Beacon_GetBeaconStatus_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   361  	var protoReq emptypb.Empty
   362  	var metadata runtime.ServerMetadata
   363  
   364  	msg, err := server.GetBeaconStatus(ctx, &protoReq)
   365  	return msg, metadata, err
   366  
   367  }
   368  
   369  var (
   370  	filter_Beacon_GetValidatorParticipation_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
   371  )
   372  
   373  func request_Beacon_GetValidatorParticipation_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   374  	var protoReq eth.GetValidatorParticipationRequest
   375  	var metadata runtime.ServerMetadata
   376  
   377  	if err := req.ParseForm(); err != nil {
   378  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   379  	}
   380  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorParticipation_0); err != nil {
   381  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   382  	}
   383  
   384  	msg, err := client.GetValidatorParticipation(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   385  	return msg, metadata, err
   386  
   387  }
   388  
   389  func local_request_Beacon_GetValidatorParticipation_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   390  	var protoReq eth.GetValidatorParticipationRequest
   391  	var metadata runtime.ServerMetadata
   392  
   393  	if err := req.ParseForm(); err != nil {
   394  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   395  	}
   396  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorParticipation_0); err != nil {
   397  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   398  	}
   399  
   400  	msg, err := server.GetValidatorParticipation(ctx, &protoReq)
   401  	return msg, metadata, err
   402  
   403  }
   404  
   405  var (
   406  	filter_Beacon_GetValidatorPerformance_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
   407  )
   408  
   409  func request_Beacon_GetValidatorPerformance_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   410  	var protoReq eth.ValidatorPerformanceRequest
   411  	var metadata runtime.ServerMetadata
   412  
   413  	if err := req.ParseForm(); err != nil {
   414  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   415  	}
   416  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorPerformance_0); err != nil {
   417  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   418  	}
   419  
   420  	msg, err := client.GetValidatorPerformance(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   421  	return msg, metadata, err
   422  
   423  }
   424  
   425  func local_request_Beacon_GetValidatorPerformance_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   426  	var protoReq eth.ValidatorPerformanceRequest
   427  	var metadata runtime.ServerMetadata
   428  
   429  	if err := req.ParseForm(); err != nil {
   430  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   431  	}
   432  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorPerformance_0); err != nil {
   433  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   434  	}
   435  
   436  	msg, err := server.GetValidatorPerformance(ctx, &protoReq)
   437  	return msg, metadata, err
   438  
   439  }
   440  
   441  var (
   442  	filter_Beacon_GetValidators_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
   443  )
   444  
   445  func request_Beacon_GetValidators_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   446  	var protoReq eth.ListValidatorsRequest
   447  	var metadata runtime.ServerMetadata
   448  
   449  	if err := req.ParseForm(); err != nil {
   450  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   451  	}
   452  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidators_0); err != nil {
   453  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   454  	}
   455  
   456  	msg, err := client.GetValidators(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   457  	return msg, metadata, err
   458  
   459  }
   460  
   461  func local_request_Beacon_GetValidators_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   462  	var protoReq eth.ListValidatorsRequest
   463  	var metadata runtime.ServerMetadata
   464  
   465  	if err := req.ParseForm(); err != nil {
   466  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   467  	}
   468  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidators_0); err != nil {
   469  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   470  	}
   471  
   472  	msg, err := server.GetValidators(ctx, &protoReq)
   473  	return msg, metadata, err
   474  
   475  }
   476  
   477  var (
   478  	filter_Beacon_GetValidatorBalances_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)}
   479  )
   480  
   481  func request_Beacon_GetValidatorBalances_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   482  	var protoReq eth.ListValidatorBalancesRequest
   483  	var metadata runtime.ServerMetadata
   484  
   485  	if err := req.ParseForm(); err != nil {
   486  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   487  	}
   488  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorBalances_0); err != nil {
   489  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   490  	}
   491  
   492  	msg, err := client.GetValidatorBalances(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   493  	return msg, metadata, err
   494  
   495  }
   496  
   497  func local_request_Beacon_GetValidatorBalances_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   498  	var protoReq eth.ListValidatorBalancesRequest
   499  	var metadata runtime.ServerMetadata
   500  
   501  	if err := req.ParseForm(); err != nil {
   502  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   503  	}
   504  	if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_Beacon_GetValidatorBalances_0); err != nil {
   505  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   506  	}
   507  
   508  	msg, err := server.GetValidatorBalances(ctx, &protoReq)
   509  	return msg, metadata, err
   510  
   511  }
   512  
   513  func request_Beacon_GetValidatorQueue_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   514  	var protoReq emptypb.Empty
   515  	var metadata runtime.ServerMetadata
   516  
   517  	msg, err := client.GetValidatorQueue(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   518  	return msg, metadata, err
   519  
   520  }
   521  
   522  func local_request_Beacon_GetValidatorQueue_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   523  	var protoReq emptypb.Empty
   524  	var metadata runtime.ServerMetadata
   525  
   526  	msg, err := server.GetValidatorQueue(ctx, &protoReq)
   527  	return msg, metadata, err
   528  
   529  }
   530  
   531  func request_Beacon_GetPeers_0(ctx context.Context, marshaler runtime.Marshaler, client BeaconClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   532  	var protoReq emptypb.Empty
   533  	var metadata runtime.ServerMetadata
   534  
   535  	msg, err := client.GetPeers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   536  	return msg, metadata, err
   537  
   538  }
   539  
   540  func local_request_Beacon_GetPeers_0(ctx context.Context, marshaler runtime.Marshaler, server BeaconServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   541  	var protoReq emptypb.Empty
   542  	var metadata runtime.ServerMetadata
   543  
   544  	msg, err := server.GetPeers(ctx, &protoReq)
   545  	return msg, metadata, err
   546  
   547  }
   548  
   549  func request_SlashingProtection_ExportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, client SlashingProtectionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   550  	var protoReq emptypb.Empty
   551  	var metadata runtime.ServerMetadata
   552  
   553  	newReader, berr := utilities.IOReaderFactory(req.Body)
   554  	if berr != nil {
   555  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   556  	}
   557  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   558  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   559  	}
   560  
   561  	msg, err := client.ExportSlashingProtection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   562  	return msg, metadata, err
   563  
   564  }
   565  
   566  func local_request_SlashingProtection_ExportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, server SlashingProtectionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   567  	var protoReq emptypb.Empty
   568  	var metadata runtime.ServerMetadata
   569  
   570  	newReader, berr := utilities.IOReaderFactory(req.Body)
   571  	if berr != nil {
   572  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   573  	}
   574  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   575  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   576  	}
   577  
   578  	msg, err := server.ExportSlashingProtection(ctx, &protoReq)
   579  	return msg, metadata, err
   580  
   581  }
   582  
   583  func request_SlashingProtection_ImportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, client SlashingProtectionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   584  	var protoReq ImportSlashingProtectionRequest
   585  	var metadata runtime.ServerMetadata
   586  
   587  	newReader, berr := utilities.IOReaderFactory(req.Body)
   588  	if berr != nil {
   589  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   590  	}
   591  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   592  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   593  	}
   594  
   595  	msg, err := client.ImportSlashingProtection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   596  	return msg, metadata, err
   597  
   598  }
   599  
   600  func local_request_SlashingProtection_ImportSlashingProtection_0(ctx context.Context, marshaler runtime.Marshaler, server SlashingProtectionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   601  	var protoReq ImportSlashingProtectionRequest
   602  	var metadata runtime.ServerMetadata
   603  
   604  	newReader, berr := utilities.IOReaderFactory(req.Body)
   605  	if berr != nil {
   606  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   607  	}
   608  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   609  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   610  	}
   611  
   612  	msg, err := server.ImportSlashingProtection(ctx, &protoReq)
   613  	return msg, metadata, err
   614  
   615  }
   616  
   617  func request_Health_GetBeaconNodeConnection_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   618  	var protoReq emptypb.Empty
   619  	var metadata runtime.ServerMetadata
   620  
   621  	msg, err := client.GetBeaconNodeConnection(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   622  	return msg, metadata, err
   623  
   624  }
   625  
   626  func local_request_Health_GetBeaconNodeConnection_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   627  	var protoReq emptypb.Empty
   628  	var metadata runtime.ServerMetadata
   629  
   630  	msg, err := server.GetBeaconNodeConnection(ctx, &protoReq)
   631  	return msg, metadata, err
   632  
   633  }
   634  
   635  func request_Health_GetLogsEndpoints_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   636  	var protoReq emptypb.Empty
   637  	var metadata runtime.ServerMetadata
   638  
   639  	msg, err := client.GetLogsEndpoints(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   640  	return msg, metadata, err
   641  
   642  }
   643  
   644  func local_request_Health_GetLogsEndpoints_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   645  	var protoReq emptypb.Empty
   646  	var metadata runtime.ServerMetadata
   647  
   648  	msg, err := server.GetLogsEndpoints(ctx, &protoReq)
   649  	return msg, metadata, err
   650  
   651  }
   652  
   653  func request_Health_GetVersion_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   654  	var protoReq emptypb.Empty
   655  	var metadata runtime.ServerMetadata
   656  
   657  	msg, err := client.GetVersion(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   658  	return msg, metadata, err
   659  
   660  }
   661  
   662  func local_request_Health_GetVersion_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   663  	var protoReq emptypb.Empty
   664  	var metadata runtime.ServerMetadata
   665  
   666  	msg, err := server.GetVersion(ctx, &protoReq)
   667  	return msg, metadata, err
   668  
   669  }
   670  
   671  func request_Health_StreamBeaconLogs_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (Health_StreamBeaconLogsClient, runtime.ServerMetadata, error) {
   672  	var protoReq emptypb.Empty
   673  	var metadata runtime.ServerMetadata
   674  
   675  	stream, err := client.StreamBeaconLogs(ctx, &protoReq)
   676  	if err != nil {
   677  		return nil, metadata, err
   678  	}
   679  	header, err := stream.Header()
   680  	if err != nil {
   681  		return nil, metadata, err
   682  	}
   683  	metadata.HeaderMD = header
   684  	return stream, metadata, nil
   685  
   686  }
   687  
   688  func request_Health_StreamValidatorLogs_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (Health_StreamValidatorLogsClient, runtime.ServerMetadata, error) {
   689  	var protoReq emptypb.Empty
   690  	var metadata runtime.ServerMetadata
   691  
   692  	stream, err := client.StreamValidatorLogs(ctx, &protoReq)
   693  	if err != nil {
   694  		return nil, metadata, err
   695  	}
   696  	header, err := stream.Header()
   697  	if err != nil {
   698  		return nil, metadata, err
   699  	}
   700  	metadata.HeaderMD = header
   701  	return stream, metadata, nil
   702  
   703  }
   704  
   705  func request_Auth_HasUsedWeb_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   706  	var protoReq emptypb.Empty
   707  	var metadata runtime.ServerMetadata
   708  
   709  	msg, err := client.HasUsedWeb(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   710  	return msg, metadata, err
   711  
   712  }
   713  
   714  func local_request_Auth_HasUsedWeb_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   715  	var protoReq emptypb.Empty
   716  	var metadata runtime.ServerMetadata
   717  
   718  	msg, err := server.HasUsedWeb(ctx, &protoReq)
   719  	return msg, metadata, err
   720  
   721  }
   722  
   723  func request_Auth_Login_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   724  	var protoReq AuthRequest
   725  	var metadata runtime.ServerMetadata
   726  
   727  	newReader, berr := utilities.IOReaderFactory(req.Body)
   728  	if berr != nil {
   729  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   730  	}
   731  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   732  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   733  	}
   734  
   735  	msg, err := client.Login(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   736  	return msg, metadata, err
   737  
   738  }
   739  
   740  func local_request_Auth_Login_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   741  	var protoReq AuthRequest
   742  	var metadata runtime.ServerMetadata
   743  
   744  	newReader, berr := utilities.IOReaderFactory(req.Body)
   745  	if berr != nil {
   746  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   747  	}
   748  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   749  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   750  	}
   751  
   752  	msg, err := server.Login(ctx, &protoReq)
   753  	return msg, metadata, err
   754  
   755  }
   756  
   757  func request_Auth_Signup_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   758  	var protoReq AuthRequest
   759  	var metadata runtime.ServerMetadata
   760  
   761  	newReader, berr := utilities.IOReaderFactory(req.Body)
   762  	if berr != nil {
   763  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   764  	}
   765  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   766  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   767  	}
   768  
   769  	msg, err := client.Signup(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   770  	return msg, metadata, err
   771  
   772  }
   773  
   774  func local_request_Auth_Signup_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   775  	var protoReq AuthRequest
   776  	var metadata runtime.ServerMetadata
   777  
   778  	newReader, berr := utilities.IOReaderFactory(req.Body)
   779  	if berr != nil {
   780  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   781  	}
   782  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   783  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   784  	}
   785  
   786  	msg, err := server.Signup(ctx, &protoReq)
   787  	return msg, metadata, err
   788  
   789  }
   790  
   791  func request_Auth_Logout_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   792  	var protoReq emptypb.Empty
   793  	var metadata runtime.ServerMetadata
   794  
   795  	newReader, berr := utilities.IOReaderFactory(req.Body)
   796  	if berr != nil {
   797  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   798  	}
   799  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   800  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   801  	}
   802  
   803  	msg, err := client.Logout(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   804  	return msg, metadata, err
   805  
   806  }
   807  
   808  func local_request_Auth_Logout_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   809  	var protoReq emptypb.Empty
   810  	var metadata runtime.ServerMetadata
   811  
   812  	newReader, berr := utilities.IOReaderFactory(req.Body)
   813  	if berr != nil {
   814  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
   815  	}
   816  	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
   817  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   818  	}
   819  
   820  	msg, err := server.Logout(ctx, &protoReq)
   821  	return msg, metadata, err
   822  
   823  }
   824  
   825  // RegisterWalletHandlerServer registers the http handlers for service Wallet to "mux".
   826  // UnaryRPC     :call WalletServer directly.
   827  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   828  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWalletHandlerFromEndpoint instead.
   829  func RegisterWalletHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WalletServer) error {
   830  
   831  	mux.Handle("POST", pattern_Wallet_CreateWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   832  		ctx, cancel := context.WithCancel(req.Context())
   833  		defer cancel()
   834  		var stream runtime.ServerTransportStream
   835  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   836  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   837  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/CreateWallet")
   838  		if err != nil {
   839  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   840  			return
   841  		}
   842  		resp, md, err := local_request_Wallet_CreateWallet_0(rctx, inboundMarshaler, server, req, pathParams)
   843  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   844  		ctx = runtime.NewServerMetadataContext(ctx, md)
   845  		if err != nil {
   846  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   847  			return
   848  		}
   849  
   850  		forward_Wallet_CreateWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   851  
   852  	})
   853  
   854  	mux.Handle("GET", pattern_Wallet_WalletConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   855  		ctx, cancel := context.WithCancel(req.Context())
   856  		defer cancel()
   857  		var stream runtime.ServerTransportStream
   858  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   859  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   860  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/WalletConfig")
   861  		if err != nil {
   862  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   863  			return
   864  		}
   865  		resp, md, err := local_request_Wallet_WalletConfig_0(rctx, inboundMarshaler, server, req, pathParams)
   866  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   867  		ctx = runtime.NewServerMetadataContext(ctx, md)
   868  		if err != nil {
   869  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   870  			return
   871  		}
   872  
   873  		forward_Wallet_WalletConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   874  
   875  	})
   876  
   877  	mux.Handle("GET", pattern_Wallet_GenerateMnemonic_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   878  		ctx, cancel := context.WithCancel(req.Context())
   879  		defer cancel()
   880  		var stream runtime.ServerTransportStream
   881  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   882  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   883  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/GenerateMnemonic")
   884  		if err != nil {
   885  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   886  			return
   887  		}
   888  		resp, md, err := local_request_Wallet_GenerateMnemonic_0(rctx, inboundMarshaler, server, req, pathParams)
   889  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   890  		ctx = runtime.NewServerMetadataContext(ctx, md)
   891  		if err != nil {
   892  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   893  			return
   894  		}
   895  
   896  		forward_Wallet_GenerateMnemonic_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   897  
   898  	})
   899  
   900  	mux.Handle("POST", pattern_Wallet_ImportKeystores_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   901  		ctx, cancel := context.WithCancel(req.Context())
   902  		defer cancel()
   903  		var stream runtime.ServerTransportStream
   904  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   905  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   906  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/ImportKeystores")
   907  		if err != nil {
   908  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   909  			return
   910  		}
   911  		resp, md, err := local_request_Wallet_ImportKeystores_0(rctx, inboundMarshaler, server, req, pathParams)
   912  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   913  		ctx = runtime.NewServerMetadataContext(ctx, md)
   914  		if err != nil {
   915  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   916  			return
   917  		}
   918  
   919  		forward_Wallet_ImportKeystores_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   920  
   921  	})
   922  
   923  	mux.Handle("POST", pattern_Wallet_RecoverWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   924  		ctx, cancel := context.WithCancel(req.Context())
   925  		defer cancel()
   926  		var stream runtime.ServerTransportStream
   927  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   928  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   929  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/RecoverWallet")
   930  		if err != nil {
   931  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   932  			return
   933  		}
   934  		resp, md, err := local_request_Wallet_RecoverWallet_0(rctx, inboundMarshaler, server, req, pathParams)
   935  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   936  		ctx = runtime.NewServerMetadataContext(ctx, md)
   937  		if err != nil {
   938  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   939  			return
   940  		}
   941  
   942  		forward_Wallet_RecoverWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   943  
   944  	})
   945  
   946  	return nil
   947  }
   948  
   949  // RegisterAccountsHandlerServer registers the http handlers for service Accounts to "mux".
   950  // UnaryRPC     :call AccountsServer directly.
   951  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
   952  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterAccountsHandlerFromEndpoint instead.
   953  func RegisterAccountsHandlerServer(ctx context.Context, mux *runtime.ServeMux, server AccountsServer) error {
   954  
   955  	mux.Handle("GET", pattern_Accounts_ListAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   956  		ctx, cancel := context.WithCancel(req.Context())
   957  		defer cancel()
   958  		var stream runtime.ServerTransportStream
   959  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   960  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   961  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ListAccounts")
   962  		if err != nil {
   963  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   964  			return
   965  		}
   966  		resp, md, err := local_request_Accounts_ListAccounts_0(rctx, inboundMarshaler, server, req, pathParams)
   967  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   968  		ctx = runtime.NewServerMetadataContext(ctx, md)
   969  		if err != nil {
   970  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   971  			return
   972  		}
   973  
   974  		forward_Accounts_ListAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   975  
   976  	})
   977  
   978  	mux.Handle("POST", pattern_Accounts_BackupAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   979  		ctx, cancel := context.WithCancel(req.Context())
   980  		defer cancel()
   981  		var stream runtime.ServerTransportStream
   982  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
   983  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   984  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/BackupAccounts")
   985  		if err != nil {
   986  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   987  			return
   988  		}
   989  		resp, md, err := local_request_Accounts_BackupAccounts_0(rctx, inboundMarshaler, server, req, pathParams)
   990  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
   991  		ctx = runtime.NewServerMetadataContext(ctx, md)
   992  		if err != nil {
   993  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   994  			return
   995  		}
   996  
   997  		forward_Accounts_BackupAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   998  
   999  	})
  1000  
  1001  	mux.Handle("POST", pattern_Accounts_DeleteAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1002  		ctx, cancel := context.WithCancel(req.Context())
  1003  		defer cancel()
  1004  		var stream runtime.ServerTransportStream
  1005  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1006  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1007  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/DeleteAccounts")
  1008  		if err != nil {
  1009  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1010  			return
  1011  		}
  1012  		resp, md, err := local_request_Accounts_DeleteAccounts_0(rctx, inboundMarshaler, server, req, pathParams)
  1013  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1014  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1015  		if err != nil {
  1016  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1017  			return
  1018  		}
  1019  
  1020  		forward_Accounts_DeleteAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1021  
  1022  	})
  1023  
  1024  	mux.Handle("POST", pattern_Accounts_ChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1025  		ctx, cancel := context.WithCancel(req.Context())
  1026  		defer cancel()
  1027  		var stream runtime.ServerTransportStream
  1028  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1029  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1030  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ChangePassword")
  1031  		if err != nil {
  1032  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1033  			return
  1034  		}
  1035  		resp, md, err := local_request_Accounts_ChangePassword_0(rctx, inboundMarshaler, server, req, pathParams)
  1036  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1037  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1038  		if err != nil {
  1039  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1040  			return
  1041  		}
  1042  
  1043  		forward_Accounts_ChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1044  
  1045  	})
  1046  
  1047  	mux.Handle("POST", pattern_Accounts_VoluntaryExit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1048  		ctx, cancel := context.WithCancel(req.Context())
  1049  		defer cancel()
  1050  		var stream runtime.ServerTransportStream
  1051  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1052  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1053  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/VoluntaryExit")
  1054  		if err != nil {
  1055  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1056  			return
  1057  		}
  1058  		resp, md, err := local_request_Accounts_VoluntaryExit_0(rctx, inboundMarshaler, server, req, pathParams)
  1059  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1060  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1061  		if err != nil {
  1062  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1063  			return
  1064  		}
  1065  
  1066  		forward_Accounts_VoluntaryExit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1067  
  1068  	})
  1069  
  1070  	return nil
  1071  }
  1072  
  1073  // RegisterBeaconHandlerServer registers the http handlers for service Beacon to "mux".
  1074  // UnaryRPC     :call BeaconServer directly.
  1075  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
  1076  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBeaconHandlerFromEndpoint instead.
  1077  func RegisterBeaconHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BeaconServer) error {
  1078  
  1079  	mux.Handle("GET", pattern_Beacon_GetBeaconStatus_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1080  		ctx, cancel := context.WithCancel(req.Context())
  1081  		defer cancel()
  1082  		var stream runtime.ServerTransportStream
  1083  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1084  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1085  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetBeaconStatus")
  1086  		if err != nil {
  1087  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1088  			return
  1089  		}
  1090  		resp, md, err := local_request_Beacon_GetBeaconStatus_0(rctx, inboundMarshaler, server, req, pathParams)
  1091  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1092  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1093  		if err != nil {
  1094  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1095  			return
  1096  		}
  1097  
  1098  		forward_Beacon_GetBeaconStatus_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1099  
  1100  	})
  1101  
  1102  	mux.Handle("GET", pattern_Beacon_GetValidatorParticipation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1103  		ctx, cancel := context.WithCancel(req.Context())
  1104  		defer cancel()
  1105  		var stream runtime.ServerTransportStream
  1106  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1107  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1108  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorParticipation")
  1109  		if err != nil {
  1110  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1111  			return
  1112  		}
  1113  		resp, md, err := local_request_Beacon_GetValidatorParticipation_0(rctx, inboundMarshaler, server, req, pathParams)
  1114  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1115  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1116  		if err != nil {
  1117  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1118  			return
  1119  		}
  1120  
  1121  		forward_Beacon_GetValidatorParticipation_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1122  
  1123  	})
  1124  
  1125  	mux.Handle("GET", pattern_Beacon_GetValidatorPerformance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1126  		ctx, cancel := context.WithCancel(req.Context())
  1127  		defer cancel()
  1128  		var stream runtime.ServerTransportStream
  1129  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1130  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1131  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorPerformance")
  1132  		if err != nil {
  1133  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1134  			return
  1135  		}
  1136  		resp, md, err := local_request_Beacon_GetValidatorPerformance_0(rctx, inboundMarshaler, server, req, pathParams)
  1137  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1138  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1139  		if err != nil {
  1140  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1141  			return
  1142  		}
  1143  
  1144  		forward_Beacon_GetValidatorPerformance_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1145  
  1146  	})
  1147  
  1148  	mux.Handle("GET", pattern_Beacon_GetValidators_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1149  		ctx, cancel := context.WithCancel(req.Context())
  1150  		defer cancel()
  1151  		var stream runtime.ServerTransportStream
  1152  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1153  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1154  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidators")
  1155  		if err != nil {
  1156  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1157  			return
  1158  		}
  1159  		resp, md, err := local_request_Beacon_GetValidators_0(rctx, inboundMarshaler, server, req, pathParams)
  1160  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1161  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1162  		if err != nil {
  1163  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1164  			return
  1165  		}
  1166  
  1167  		forward_Beacon_GetValidators_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1168  
  1169  	})
  1170  
  1171  	mux.Handle("GET", pattern_Beacon_GetValidatorBalances_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1172  		ctx, cancel := context.WithCancel(req.Context())
  1173  		defer cancel()
  1174  		var stream runtime.ServerTransportStream
  1175  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1176  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1177  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorBalances")
  1178  		if err != nil {
  1179  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1180  			return
  1181  		}
  1182  		resp, md, err := local_request_Beacon_GetValidatorBalances_0(rctx, inboundMarshaler, server, req, pathParams)
  1183  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1184  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1185  		if err != nil {
  1186  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1187  			return
  1188  		}
  1189  
  1190  		forward_Beacon_GetValidatorBalances_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1191  
  1192  	})
  1193  
  1194  	mux.Handle("GET", pattern_Beacon_GetValidatorQueue_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1195  		ctx, cancel := context.WithCancel(req.Context())
  1196  		defer cancel()
  1197  		var stream runtime.ServerTransportStream
  1198  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1199  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1200  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorQueue")
  1201  		if err != nil {
  1202  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1203  			return
  1204  		}
  1205  		resp, md, err := local_request_Beacon_GetValidatorQueue_0(rctx, inboundMarshaler, server, req, pathParams)
  1206  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1207  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1208  		if err != nil {
  1209  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1210  			return
  1211  		}
  1212  
  1213  		forward_Beacon_GetValidatorQueue_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1214  
  1215  	})
  1216  
  1217  	mux.Handle("GET", pattern_Beacon_GetPeers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1218  		ctx, cancel := context.WithCancel(req.Context())
  1219  		defer cancel()
  1220  		var stream runtime.ServerTransportStream
  1221  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1222  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1223  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetPeers")
  1224  		if err != nil {
  1225  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1226  			return
  1227  		}
  1228  		resp, md, err := local_request_Beacon_GetPeers_0(rctx, inboundMarshaler, server, req, pathParams)
  1229  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1230  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1231  		if err != nil {
  1232  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1233  			return
  1234  		}
  1235  
  1236  		forward_Beacon_GetPeers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1237  
  1238  	})
  1239  
  1240  	return nil
  1241  }
  1242  
  1243  // RegisterSlashingProtectionHandlerServer registers the http handlers for service SlashingProtection to "mux".
  1244  // UnaryRPC     :call SlashingProtectionServer directly.
  1245  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
  1246  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSlashingProtectionHandlerFromEndpoint instead.
  1247  func RegisterSlashingProtectionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SlashingProtectionServer) error {
  1248  
  1249  	mux.Handle("POST", pattern_SlashingProtection_ExportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1250  		ctx, cancel := context.WithCancel(req.Context())
  1251  		defer cancel()
  1252  		var stream runtime.ServerTransportStream
  1253  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1254  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1255  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ExportSlashingProtection")
  1256  		if err != nil {
  1257  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1258  			return
  1259  		}
  1260  		resp, md, err := local_request_SlashingProtection_ExportSlashingProtection_0(rctx, inboundMarshaler, server, req, pathParams)
  1261  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1262  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1263  		if err != nil {
  1264  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1265  			return
  1266  		}
  1267  
  1268  		forward_SlashingProtection_ExportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1269  
  1270  	})
  1271  
  1272  	mux.Handle("POST", pattern_SlashingProtection_ImportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1273  		ctx, cancel := context.WithCancel(req.Context())
  1274  		defer cancel()
  1275  		var stream runtime.ServerTransportStream
  1276  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1277  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1278  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ImportSlashingProtection")
  1279  		if err != nil {
  1280  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1281  			return
  1282  		}
  1283  		resp, md, err := local_request_SlashingProtection_ImportSlashingProtection_0(rctx, inboundMarshaler, server, req, pathParams)
  1284  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1285  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1286  		if err != nil {
  1287  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1288  			return
  1289  		}
  1290  
  1291  		forward_SlashingProtection_ImportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1292  
  1293  	})
  1294  
  1295  	return nil
  1296  }
  1297  
  1298  // RegisterHealthHandlerServer registers the http handlers for service Health to "mux".
  1299  // UnaryRPC     :call HealthServer directly.
  1300  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
  1301  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterHealthHandlerFromEndpoint instead.
  1302  func RegisterHealthHandlerServer(ctx context.Context, mux *runtime.ServeMux, server HealthServer) error {
  1303  
  1304  	mux.Handle("GET", pattern_Health_GetBeaconNodeConnection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1305  		ctx, cancel := context.WithCancel(req.Context())
  1306  		defer cancel()
  1307  		var stream runtime.ServerTransportStream
  1308  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1309  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1310  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetBeaconNodeConnection")
  1311  		if err != nil {
  1312  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1313  			return
  1314  		}
  1315  		resp, md, err := local_request_Health_GetBeaconNodeConnection_0(rctx, inboundMarshaler, server, req, pathParams)
  1316  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1317  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1318  		if err != nil {
  1319  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1320  			return
  1321  		}
  1322  
  1323  		forward_Health_GetBeaconNodeConnection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1324  
  1325  	})
  1326  
  1327  	mux.Handle("GET", pattern_Health_GetLogsEndpoints_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1328  		ctx, cancel := context.WithCancel(req.Context())
  1329  		defer cancel()
  1330  		var stream runtime.ServerTransportStream
  1331  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1332  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1333  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetLogsEndpoints")
  1334  		if err != nil {
  1335  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1336  			return
  1337  		}
  1338  		resp, md, err := local_request_Health_GetLogsEndpoints_0(rctx, inboundMarshaler, server, req, pathParams)
  1339  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1340  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1341  		if err != nil {
  1342  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1343  			return
  1344  		}
  1345  
  1346  		forward_Health_GetLogsEndpoints_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1347  
  1348  	})
  1349  
  1350  	mux.Handle("GET", pattern_Health_GetVersion_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1351  		ctx, cancel := context.WithCancel(req.Context())
  1352  		defer cancel()
  1353  		var stream runtime.ServerTransportStream
  1354  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1355  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1356  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetVersion")
  1357  		if err != nil {
  1358  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1359  			return
  1360  		}
  1361  		resp, md, err := local_request_Health_GetVersion_0(rctx, inboundMarshaler, server, req, pathParams)
  1362  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1363  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1364  		if err != nil {
  1365  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1366  			return
  1367  		}
  1368  
  1369  		forward_Health_GetVersion_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1370  
  1371  	})
  1372  
  1373  	mux.Handle("GET", pattern_Health_StreamBeaconLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1374  		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
  1375  		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1376  		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1377  		return
  1378  	})
  1379  
  1380  	mux.Handle("GET", pattern_Health_StreamValidatorLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1381  		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
  1382  		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1383  		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1384  		return
  1385  	})
  1386  
  1387  	return nil
  1388  }
  1389  
  1390  // RegisterAuthHandlerServer registers the http handlers for service Auth to "mux".
  1391  // UnaryRPC     :call AuthServer directly.
  1392  // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
  1393  // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterAuthHandlerFromEndpoint instead.
  1394  func RegisterAuthHandlerServer(ctx context.Context, mux *runtime.ServeMux, server AuthServer) error {
  1395  
  1396  	mux.Handle("GET", pattern_Auth_HasUsedWeb_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1397  		ctx, cancel := context.WithCancel(req.Context())
  1398  		defer cancel()
  1399  		var stream runtime.ServerTransportStream
  1400  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1401  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1402  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/HasUsedWeb")
  1403  		if err != nil {
  1404  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1405  			return
  1406  		}
  1407  		resp, md, err := local_request_Auth_HasUsedWeb_0(rctx, inboundMarshaler, server, req, pathParams)
  1408  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1409  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1410  		if err != nil {
  1411  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1412  			return
  1413  		}
  1414  
  1415  		forward_Auth_HasUsedWeb_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1416  
  1417  	})
  1418  
  1419  	mux.Handle("POST", pattern_Auth_Login_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1420  		ctx, cancel := context.WithCancel(req.Context())
  1421  		defer cancel()
  1422  		var stream runtime.ServerTransportStream
  1423  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1424  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1425  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Login")
  1426  		if err != nil {
  1427  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1428  			return
  1429  		}
  1430  		resp, md, err := local_request_Auth_Login_0(rctx, inboundMarshaler, server, req, pathParams)
  1431  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1432  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1433  		if err != nil {
  1434  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1435  			return
  1436  		}
  1437  
  1438  		forward_Auth_Login_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1439  
  1440  	})
  1441  
  1442  	mux.Handle("POST", pattern_Auth_Signup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1443  		ctx, cancel := context.WithCancel(req.Context())
  1444  		defer cancel()
  1445  		var stream runtime.ServerTransportStream
  1446  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1447  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1448  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Signup")
  1449  		if err != nil {
  1450  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1451  			return
  1452  		}
  1453  		resp, md, err := local_request_Auth_Signup_0(rctx, inboundMarshaler, server, req, pathParams)
  1454  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1455  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1456  		if err != nil {
  1457  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1458  			return
  1459  		}
  1460  
  1461  		forward_Auth_Signup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1462  
  1463  	})
  1464  
  1465  	mux.Handle("POST", pattern_Auth_Logout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1466  		ctx, cancel := context.WithCancel(req.Context())
  1467  		defer cancel()
  1468  		var stream runtime.ServerTransportStream
  1469  		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
  1470  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1471  		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Logout")
  1472  		if err != nil {
  1473  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1474  			return
  1475  		}
  1476  		resp, md, err := local_request_Auth_Logout_0(rctx, inboundMarshaler, server, req, pathParams)
  1477  		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
  1478  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1479  		if err != nil {
  1480  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1481  			return
  1482  		}
  1483  
  1484  		forward_Auth_Logout_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1485  
  1486  	})
  1487  
  1488  	return nil
  1489  }
  1490  
  1491  // RegisterWalletHandlerFromEndpoint is same as RegisterWalletHandler but
  1492  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1493  func RegisterWalletHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1494  	conn, err := grpc.Dial(endpoint, opts...)
  1495  	if err != nil {
  1496  		return err
  1497  	}
  1498  	defer func() {
  1499  		if err != nil {
  1500  			if cerr := conn.Close(); cerr != nil {
  1501  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1502  			}
  1503  			return
  1504  		}
  1505  		go func() {
  1506  			<-ctx.Done()
  1507  			if cerr := conn.Close(); cerr != nil {
  1508  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1509  			}
  1510  		}()
  1511  	}()
  1512  
  1513  	return RegisterWalletHandler(ctx, mux, conn)
  1514  }
  1515  
  1516  // RegisterWalletHandler registers the http handlers for service Wallet to "mux".
  1517  // The handlers forward requests to the grpc endpoint over "conn".
  1518  func RegisterWalletHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1519  	return RegisterWalletHandlerClient(ctx, mux, NewWalletClient(conn))
  1520  }
  1521  
  1522  // RegisterWalletHandlerClient registers the http handlers for service Wallet
  1523  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WalletClient".
  1524  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WalletClient"
  1525  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1526  // "WalletClient" to call the correct interceptors.
  1527  func RegisterWalletHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WalletClient) error {
  1528  
  1529  	mux.Handle("POST", pattern_Wallet_CreateWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1530  		ctx, cancel := context.WithCancel(req.Context())
  1531  		defer cancel()
  1532  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1533  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/CreateWallet")
  1534  		if err != nil {
  1535  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1536  			return
  1537  		}
  1538  		resp, md, err := request_Wallet_CreateWallet_0(rctx, inboundMarshaler, client, req, pathParams)
  1539  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1540  		if err != nil {
  1541  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1542  			return
  1543  		}
  1544  
  1545  		forward_Wallet_CreateWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1546  
  1547  	})
  1548  
  1549  	mux.Handle("GET", pattern_Wallet_WalletConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1550  		ctx, cancel := context.WithCancel(req.Context())
  1551  		defer cancel()
  1552  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1553  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/WalletConfig")
  1554  		if err != nil {
  1555  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1556  			return
  1557  		}
  1558  		resp, md, err := request_Wallet_WalletConfig_0(rctx, inboundMarshaler, client, req, pathParams)
  1559  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1560  		if err != nil {
  1561  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1562  			return
  1563  		}
  1564  
  1565  		forward_Wallet_WalletConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1566  
  1567  	})
  1568  
  1569  	mux.Handle("GET", pattern_Wallet_GenerateMnemonic_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1570  		ctx, cancel := context.WithCancel(req.Context())
  1571  		defer cancel()
  1572  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1573  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/GenerateMnemonic")
  1574  		if err != nil {
  1575  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1576  			return
  1577  		}
  1578  		resp, md, err := request_Wallet_GenerateMnemonic_0(rctx, inboundMarshaler, client, req, pathParams)
  1579  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1580  		if err != nil {
  1581  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1582  			return
  1583  		}
  1584  
  1585  		forward_Wallet_GenerateMnemonic_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1586  
  1587  	})
  1588  
  1589  	mux.Handle("POST", pattern_Wallet_ImportKeystores_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1590  		ctx, cancel := context.WithCancel(req.Context())
  1591  		defer cancel()
  1592  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1593  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/ImportKeystores")
  1594  		if err != nil {
  1595  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1596  			return
  1597  		}
  1598  		resp, md, err := request_Wallet_ImportKeystores_0(rctx, inboundMarshaler, client, req, pathParams)
  1599  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1600  		if err != nil {
  1601  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1602  			return
  1603  		}
  1604  
  1605  		forward_Wallet_ImportKeystores_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1606  
  1607  	})
  1608  
  1609  	mux.Handle("POST", pattern_Wallet_RecoverWallet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1610  		ctx, cancel := context.WithCancel(req.Context())
  1611  		defer cancel()
  1612  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1613  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Wallet/RecoverWallet")
  1614  		if err != nil {
  1615  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1616  			return
  1617  		}
  1618  		resp, md, err := request_Wallet_RecoverWallet_0(rctx, inboundMarshaler, client, req, pathParams)
  1619  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1620  		if err != nil {
  1621  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1622  			return
  1623  		}
  1624  
  1625  		forward_Wallet_RecoverWallet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1626  
  1627  	})
  1628  
  1629  	return nil
  1630  }
  1631  
  1632  var (
  1633  	pattern_Wallet_CreateWallet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "wallet", "create"}, ""))
  1634  
  1635  	pattern_Wallet_WalletConfig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "wallet"}, ""))
  1636  
  1637  	pattern_Wallet_GenerateMnemonic_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "mnemonic", "generate"}, ""))
  1638  
  1639  	pattern_Wallet_ImportKeystores_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "wallet", "keystores", "import"}, ""))
  1640  
  1641  	pattern_Wallet_RecoverWallet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "wallet", "recover"}, ""))
  1642  )
  1643  
  1644  var (
  1645  	forward_Wallet_CreateWallet_0 = runtime.ForwardResponseMessage
  1646  
  1647  	forward_Wallet_WalletConfig_0 = runtime.ForwardResponseMessage
  1648  
  1649  	forward_Wallet_GenerateMnemonic_0 = runtime.ForwardResponseMessage
  1650  
  1651  	forward_Wallet_ImportKeystores_0 = runtime.ForwardResponseMessage
  1652  
  1653  	forward_Wallet_RecoverWallet_0 = runtime.ForwardResponseMessage
  1654  )
  1655  
  1656  // RegisterAccountsHandlerFromEndpoint is same as RegisterAccountsHandler but
  1657  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1658  func RegisterAccountsHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1659  	conn, err := grpc.Dial(endpoint, opts...)
  1660  	if err != nil {
  1661  		return err
  1662  	}
  1663  	defer func() {
  1664  		if err != nil {
  1665  			if cerr := conn.Close(); cerr != nil {
  1666  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1667  			}
  1668  			return
  1669  		}
  1670  		go func() {
  1671  			<-ctx.Done()
  1672  			if cerr := conn.Close(); cerr != nil {
  1673  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1674  			}
  1675  		}()
  1676  	}()
  1677  
  1678  	return RegisterAccountsHandler(ctx, mux, conn)
  1679  }
  1680  
  1681  // RegisterAccountsHandler registers the http handlers for service Accounts to "mux".
  1682  // The handlers forward requests to the grpc endpoint over "conn".
  1683  func RegisterAccountsHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1684  	return RegisterAccountsHandlerClient(ctx, mux, NewAccountsClient(conn))
  1685  }
  1686  
  1687  // RegisterAccountsHandlerClient registers the http handlers for service Accounts
  1688  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AccountsClient".
  1689  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AccountsClient"
  1690  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1691  // "AccountsClient" to call the correct interceptors.
  1692  func RegisterAccountsHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AccountsClient) error {
  1693  
  1694  	mux.Handle("GET", pattern_Accounts_ListAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1695  		ctx, cancel := context.WithCancel(req.Context())
  1696  		defer cancel()
  1697  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1698  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ListAccounts")
  1699  		if err != nil {
  1700  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1701  			return
  1702  		}
  1703  		resp, md, err := request_Accounts_ListAccounts_0(rctx, inboundMarshaler, client, req, pathParams)
  1704  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1705  		if err != nil {
  1706  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1707  			return
  1708  		}
  1709  
  1710  		forward_Accounts_ListAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1711  
  1712  	})
  1713  
  1714  	mux.Handle("POST", pattern_Accounts_BackupAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1715  		ctx, cancel := context.WithCancel(req.Context())
  1716  		defer cancel()
  1717  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1718  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/BackupAccounts")
  1719  		if err != nil {
  1720  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1721  			return
  1722  		}
  1723  		resp, md, err := request_Accounts_BackupAccounts_0(rctx, inboundMarshaler, client, req, pathParams)
  1724  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1725  		if err != nil {
  1726  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1727  			return
  1728  		}
  1729  
  1730  		forward_Accounts_BackupAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1731  
  1732  	})
  1733  
  1734  	mux.Handle("POST", pattern_Accounts_DeleteAccounts_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1735  		ctx, cancel := context.WithCancel(req.Context())
  1736  		defer cancel()
  1737  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1738  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/DeleteAccounts")
  1739  		if err != nil {
  1740  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1741  			return
  1742  		}
  1743  		resp, md, err := request_Accounts_DeleteAccounts_0(rctx, inboundMarshaler, client, req, pathParams)
  1744  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1745  		if err != nil {
  1746  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1747  			return
  1748  		}
  1749  
  1750  		forward_Accounts_DeleteAccounts_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1751  
  1752  	})
  1753  
  1754  	mux.Handle("POST", pattern_Accounts_ChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1755  		ctx, cancel := context.WithCancel(req.Context())
  1756  		defer cancel()
  1757  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1758  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/ChangePassword")
  1759  		if err != nil {
  1760  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1761  			return
  1762  		}
  1763  		resp, md, err := request_Accounts_ChangePassword_0(rctx, inboundMarshaler, client, req, pathParams)
  1764  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1765  		if err != nil {
  1766  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1767  			return
  1768  		}
  1769  
  1770  		forward_Accounts_ChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1771  
  1772  	})
  1773  
  1774  	mux.Handle("POST", pattern_Accounts_VoluntaryExit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1775  		ctx, cancel := context.WithCancel(req.Context())
  1776  		defer cancel()
  1777  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1778  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Accounts/VoluntaryExit")
  1779  		if err != nil {
  1780  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1781  			return
  1782  		}
  1783  		resp, md, err := request_Accounts_VoluntaryExit_0(rctx, inboundMarshaler, client, req, pathParams)
  1784  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1785  		if err != nil {
  1786  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1787  			return
  1788  		}
  1789  
  1790  		forward_Accounts_VoluntaryExit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1791  
  1792  	})
  1793  
  1794  	return nil
  1795  }
  1796  
  1797  var (
  1798  	pattern_Accounts_ListAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "accounts"}, ""))
  1799  
  1800  	pattern_Accounts_BackupAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "accounts", "backup"}, ""))
  1801  
  1802  	pattern_Accounts_DeleteAccounts_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "wallet", "accounts", "delete"}, ""))
  1803  
  1804  	pattern_Accounts_ChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "password", "edit"}, ""))
  1805  
  1806  	pattern_Accounts_VoluntaryExit_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "accounts", "voluntary-exit"}, ""))
  1807  )
  1808  
  1809  var (
  1810  	forward_Accounts_ListAccounts_0 = runtime.ForwardResponseMessage
  1811  
  1812  	forward_Accounts_BackupAccounts_0 = runtime.ForwardResponseMessage
  1813  
  1814  	forward_Accounts_DeleteAccounts_0 = runtime.ForwardResponseMessage
  1815  
  1816  	forward_Accounts_ChangePassword_0 = runtime.ForwardResponseMessage
  1817  
  1818  	forward_Accounts_VoluntaryExit_0 = runtime.ForwardResponseMessage
  1819  )
  1820  
  1821  // RegisterBeaconHandlerFromEndpoint is same as RegisterBeaconHandler but
  1822  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1823  func RegisterBeaconHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1824  	conn, err := grpc.Dial(endpoint, opts...)
  1825  	if err != nil {
  1826  		return err
  1827  	}
  1828  	defer func() {
  1829  		if err != nil {
  1830  			if cerr := conn.Close(); cerr != nil {
  1831  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1832  			}
  1833  			return
  1834  		}
  1835  		go func() {
  1836  			<-ctx.Done()
  1837  			if cerr := conn.Close(); cerr != nil {
  1838  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  1839  			}
  1840  		}()
  1841  	}()
  1842  
  1843  	return RegisterBeaconHandler(ctx, mux, conn)
  1844  }
  1845  
  1846  // RegisterBeaconHandler registers the http handlers for service Beacon to "mux".
  1847  // The handlers forward requests to the grpc endpoint over "conn".
  1848  func RegisterBeaconHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1849  	return RegisterBeaconHandlerClient(ctx, mux, NewBeaconClient(conn))
  1850  }
  1851  
  1852  // RegisterBeaconHandlerClient registers the http handlers for service Beacon
  1853  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BeaconClient".
  1854  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BeaconClient"
  1855  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1856  // "BeaconClient" to call the correct interceptors.
  1857  func RegisterBeaconHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BeaconClient) error {
  1858  
  1859  	mux.Handle("GET", pattern_Beacon_GetBeaconStatus_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1860  		ctx, cancel := context.WithCancel(req.Context())
  1861  		defer cancel()
  1862  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1863  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetBeaconStatus")
  1864  		if err != nil {
  1865  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1866  			return
  1867  		}
  1868  		resp, md, err := request_Beacon_GetBeaconStatus_0(rctx, inboundMarshaler, client, req, pathParams)
  1869  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1870  		if err != nil {
  1871  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1872  			return
  1873  		}
  1874  
  1875  		forward_Beacon_GetBeaconStatus_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1876  
  1877  	})
  1878  
  1879  	mux.Handle("GET", pattern_Beacon_GetValidatorParticipation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1880  		ctx, cancel := context.WithCancel(req.Context())
  1881  		defer cancel()
  1882  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1883  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorParticipation")
  1884  		if err != nil {
  1885  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1886  			return
  1887  		}
  1888  		resp, md, err := request_Beacon_GetValidatorParticipation_0(rctx, inboundMarshaler, client, req, pathParams)
  1889  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1890  		if err != nil {
  1891  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1892  			return
  1893  		}
  1894  
  1895  		forward_Beacon_GetValidatorParticipation_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1896  
  1897  	})
  1898  
  1899  	mux.Handle("GET", pattern_Beacon_GetValidatorPerformance_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1900  		ctx, cancel := context.WithCancel(req.Context())
  1901  		defer cancel()
  1902  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1903  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorPerformance")
  1904  		if err != nil {
  1905  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1906  			return
  1907  		}
  1908  		resp, md, err := request_Beacon_GetValidatorPerformance_0(rctx, inboundMarshaler, client, req, pathParams)
  1909  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1910  		if err != nil {
  1911  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1912  			return
  1913  		}
  1914  
  1915  		forward_Beacon_GetValidatorPerformance_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1916  
  1917  	})
  1918  
  1919  	mux.Handle("GET", pattern_Beacon_GetValidators_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1920  		ctx, cancel := context.WithCancel(req.Context())
  1921  		defer cancel()
  1922  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1923  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidators")
  1924  		if err != nil {
  1925  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1926  			return
  1927  		}
  1928  		resp, md, err := request_Beacon_GetValidators_0(rctx, inboundMarshaler, client, req, pathParams)
  1929  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1930  		if err != nil {
  1931  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1932  			return
  1933  		}
  1934  
  1935  		forward_Beacon_GetValidators_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1936  
  1937  	})
  1938  
  1939  	mux.Handle("GET", pattern_Beacon_GetValidatorBalances_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1940  		ctx, cancel := context.WithCancel(req.Context())
  1941  		defer cancel()
  1942  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1943  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorBalances")
  1944  		if err != nil {
  1945  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1946  			return
  1947  		}
  1948  		resp, md, err := request_Beacon_GetValidatorBalances_0(rctx, inboundMarshaler, client, req, pathParams)
  1949  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1950  		if err != nil {
  1951  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1952  			return
  1953  		}
  1954  
  1955  		forward_Beacon_GetValidatorBalances_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1956  
  1957  	})
  1958  
  1959  	mux.Handle("GET", pattern_Beacon_GetValidatorQueue_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1960  		ctx, cancel := context.WithCancel(req.Context())
  1961  		defer cancel()
  1962  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1963  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetValidatorQueue")
  1964  		if err != nil {
  1965  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1966  			return
  1967  		}
  1968  		resp, md, err := request_Beacon_GetValidatorQueue_0(rctx, inboundMarshaler, client, req, pathParams)
  1969  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1970  		if err != nil {
  1971  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1972  			return
  1973  		}
  1974  
  1975  		forward_Beacon_GetValidatorQueue_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1976  
  1977  	})
  1978  
  1979  	mux.Handle("GET", pattern_Beacon_GetPeers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1980  		ctx, cancel := context.WithCancel(req.Context())
  1981  		defer cancel()
  1982  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1983  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Beacon/GetPeers")
  1984  		if err != nil {
  1985  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1986  			return
  1987  		}
  1988  		resp, md, err := request_Beacon_GetPeers_0(rctx, inboundMarshaler, client, req, pathParams)
  1989  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1990  		if err != nil {
  1991  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1992  			return
  1993  		}
  1994  
  1995  		forward_Beacon_GetPeers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1996  
  1997  	})
  1998  
  1999  	return nil
  2000  }
  2001  
  2002  var (
  2003  	pattern_Beacon_GetBeaconStatus_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "status"}, ""))
  2004  
  2005  	pattern_Beacon_GetValidatorParticipation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "participation"}, ""))
  2006  
  2007  	pattern_Beacon_GetValidatorPerformance_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "performance"}, ""))
  2008  
  2009  	pattern_Beacon_GetValidators_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "validators"}, ""))
  2010  
  2011  	pattern_Beacon_GetValidatorBalances_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "balances"}, ""))
  2012  
  2013  	pattern_Beacon_GetValidatorQueue_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "queue"}, ""))
  2014  
  2015  	pattern_Beacon_GetPeers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "beacon", "peers"}, ""))
  2016  )
  2017  
  2018  var (
  2019  	forward_Beacon_GetBeaconStatus_0 = runtime.ForwardResponseMessage
  2020  
  2021  	forward_Beacon_GetValidatorParticipation_0 = runtime.ForwardResponseMessage
  2022  
  2023  	forward_Beacon_GetValidatorPerformance_0 = runtime.ForwardResponseMessage
  2024  
  2025  	forward_Beacon_GetValidators_0 = runtime.ForwardResponseMessage
  2026  
  2027  	forward_Beacon_GetValidatorBalances_0 = runtime.ForwardResponseMessage
  2028  
  2029  	forward_Beacon_GetValidatorQueue_0 = runtime.ForwardResponseMessage
  2030  
  2031  	forward_Beacon_GetPeers_0 = runtime.ForwardResponseMessage
  2032  )
  2033  
  2034  // RegisterSlashingProtectionHandlerFromEndpoint is same as RegisterSlashingProtectionHandler but
  2035  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  2036  func RegisterSlashingProtectionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  2037  	conn, err := grpc.Dial(endpoint, opts...)
  2038  	if err != nil {
  2039  		return err
  2040  	}
  2041  	defer func() {
  2042  		if err != nil {
  2043  			if cerr := conn.Close(); cerr != nil {
  2044  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2045  			}
  2046  			return
  2047  		}
  2048  		go func() {
  2049  			<-ctx.Done()
  2050  			if cerr := conn.Close(); cerr != nil {
  2051  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2052  			}
  2053  		}()
  2054  	}()
  2055  
  2056  	return RegisterSlashingProtectionHandler(ctx, mux, conn)
  2057  }
  2058  
  2059  // RegisterSlashingProtectionHandler registers the http handlers for service SlashingProtection to "mux".
  2060  // The handlers forward requests to the grpc endpoint over "conn".
  2061  func RegisterSlashingProtectionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  2062  	return RegisterSlashingProtectionHandlerClient(ctx, mux, NewSlashingProtectionClient(conn))
  2063  }
  2064  
  2065  // RegisterSlashingProtectionHandlerClient registers the http handlers for service SlashingProtection
  2066  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SlashingProtectionClient".
  2067  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SlashingProtectionClient"
  2068  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  2069  // "SlashingProtectionClient" to call the correct interceptors.
  2070  func RegisterSlashingProtectionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SlashingProtectionClient) error {
  2071  
  2072  	mux.Handle("POST", pattern_SlashingProtection_ExportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2073  		ctx, cancel := context.WithCancel(req.Context())
  2074  		defer cancel()
  2075  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2076  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ExportSlashingProtection")
  2077  		if err != nil {
  2078  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2079  			return
  2080  		}
  2081  		resp, md, err := request_SlashingProtection_ExportSlashingProtection_0(rctx, inboundMarshaler, client, req, pathParams)
  2082  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2083  		if err != nil {
  2084  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2085  			return
  2086  		}
  2087  
  2088  		forward_SlashingProtection_ExportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2089  
  2090  	})
  2091  
  2092  	mux.Handle("POST", pattern_SlashingProtection_ImportSlashingProtection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2093  		ctx, cancel := context.WithCancel(req.Context())
  2094  		defer cancel()
  2095  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2096  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.SlashingProtection/ImportSlashingProtection")
  2097  		if err != nil {
  2098  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2099  			return
  2100  		}
  2101  		resp, md, err := request_SlashingProtection_ImportSlashingProtection_0(rctx, inboundMarshaler, client, req, pathParams)
  2102  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2103  		if err != nil {
  2104  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2105  			return
  2106  		}
  2107  
  2108  		forward_SlashingProtection_ImportSlashingProtection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2109  
  2110  	})
  2111  
  2112  	return nil
  2113  }
  2114  
  2115  var (
  2116  	pattern_SlashingProtection_ExportSlashingProtection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "slashing-protection", "export"}, ""))
  2117  
  2118  	pattern_SlashingProtection_ImportSlashingProtection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "slashing-protection", "import"}, ""))
  2119  )
  2120  
  2121  var (
  2122  	forward_SlashingProtection_ExportSlashingProtection_0 = runtime.ForwardResponseMessage
  2123  
  2124  	forward_SlashingProtection_ImportSlashingProtection_0 = runtime.ForwardResponseMessage
  2125  )
  2126  
  2127  // RegisterHealthHandlerFromEndpoint is same as RegisterHealthHandler but
  2128  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  2129  func RegisterHealthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  2130  	conn, err := grpc.Dial(endpoint, opts...)
  2131  	if err != nil {
  2132  		return err
  2133  	}
  2134  	defer func() {
  2135  		if err != nil {
  2136  			if cerr := conn.Close(); cerr != nil {
  2137  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2138  			}
  2139  			return
  2140  		}
  2141  		go func() {
  2142  			<-ctx.Done()
  2143  			if cerr := conn.Close(); cerr != nil {
  2144  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2145  			}
  2146  		}()
  2147  	}()
  2148  
  2149  	return RegisterHealthHandler(ctx, mux, conn)
  2150  }
  2151  
  2152  // RegisterHealthHandler registers the http handlers for service Health to "mux".
  2153  // The handlers forward requests to the grpc endpoint over "conn".
  2154  func RegisterHealthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  2155  	return RegisterHealthHandlerClient(ctx, mux, NewHealthClient(conn))
  2156  }
  2157  
  2158  // RegisterHealthHandlerClient registers the http handlers for service Health
  2159  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "HealthClient".
  2160  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "HealthClient"
  2161  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  2162  // "HealthClient" to call the correct interceptors.
  2163  func RegisterHealthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client HealthClient) error {
  2164  
  2165  	mux.Handle("GET", pattern_Health_GetBeaconNodeConnection_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2166  		ctx, cancel := context.WithCancel(req.Context())
  2167  		defer cancel()
  2168  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2169  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetBeaconNodeConnection")
  2170  		if err != nil {
  2171  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2172  			return
  2173  		}
  2174  		resp, md, err := request_Health_GetBeaconNodeConnection_0(rctx, inboundMarshaler, client, req, pathParams)
  2175  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2176  		if err != nil {
  2177  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2178  			return
  2179  		}
  2180  
  2181  		forward_Health_GetBeaconNodeConnection_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2182  
  2183  	})
  2184  
  2185  	mux.Handle("GET", pattern_Health_GetLogsEndpoints_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2186  		ctx, cancel := context.WithCancel(req.Context())
  2187  		defer cancel()
  2188  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2189  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetLogsEndpoints")
  2190  		if err != nil {
  2191  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2192  			return
  2193  		}
  2194  		resp, md, err := request_Health_GetLogsEndpoints_0(rctx, inboundMarshaler, client, req, pathParams)
  2195  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2196  		if err != nil {
  2197  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2198  			return
  2199  		}
  2200  
  2201  		forward_Health_GetLogsEndpoints_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2202  
  2203  	})
  2204  
  2205  	mux.Handle("GET", pattern_Health_GetVersion_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2206  		ctx, cancel := context.WithCancel(req.Context())
  2207  		defer cancel()
  2208  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2209  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/GetVersion")
  2210  		if err != nil {
  2211  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2212  			return
  2213  		}
  2214  		resp, md, err := request_Health_GetVersion_0(rctx, inboundMarshaler, client, req, pathParams)
  2215  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2216  		if err != nil {
  2217  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2218  			return
  2219  		}
  2220  
  2221  		forward_Health_GetVersion_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2222  
  2223  	})
  2224  
  2225  	mux.Handle("GET", pattern_Health_StreamBeaconLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2226  		ctx, cancel := context.WithCancel(req.Context())
  2227  		defer cancel()
  2228  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2229  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/StreamBeaconLogs")
  2230  		if err != nil {
  2231  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2232  			return
  2233  		}
  2234  		resp, md, err := request_Health_StreamBeaconLogs_0(rctx, inboundMarshaler, client, req, pathParams)
  2235  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2236  		if err != nil {
  2237  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2238  			return
  2239  		}
  2240  
  2241  		forward_Health_StreamBeaconLogs_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
  2242  
  2243  	})
  2244  
  2245  	mux.Handle("GET", pattern_Health_StreamValidatorLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2246  		ctx, cancel := context.WithCancel(req.Context())
  2247  		defer cancel()
  2248  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2249  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Health/StreamValidatorLogs")
  2250  		if err != nil {
  2251  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2252  			return
  2253  		}
  2254  		resp, md, err := request_Health_StreamValidatorLogs_0(rctx, inboundMarshaler, client, req, pathParams)
  2255  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2256  		if err != nil {
  2257  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2258  			return
  2259  		}
  2260  
  2261  		forward_Health_StreamValidatorLogs_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
  2262  
  2263  	})
  2264  
  2265  	return nil
  2266  }
  2267  
  2268  var (
  2269  	pattern_Health_GetBeaconNodeConnection_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "health", "node_connection"}, ""))
  2270  
  2271  	pattern_Health_GetLogsEndpoints_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"v2", "validator", "health", "logs", "endpoints"}, ""))
  2272  
  2273  	pattern_Health_GetVersion_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "validator", "health", "version"}, ""))
  2274  
  2275  	pattern_Health_StreamBeaconLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4, 2, 5}, []string{"v2", "validator", "health", "logs", "beacon", "stream"}, ""))
  2276  
  2277  	pattern_Health_StreamValidatorLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 1, 2, 4}, []string{"v2", "validator", "health", "logs", "stream"}, ""))
  2278  )
  2279  
  2280  var (
  2281  	forward_Health_GetBeaconNodeConnection_0 = runtime.ForwardResponseMessage
  2282  
  2283  	forward_Health_GetLogsEndpoints_0 = runtime.ForwardResponseMessage
  2284  
  2285  	forward_Health_GetVersion_0 = runtime.ForwardResponseMessage
  2286  
  2287  	forward_Health_StreamBeaconLogs_0 = runtime.ForwardResponseStream
  2288  
  2289  	forward_Health_StreamValidatorLogs_0 = runtime.ForwardResponseStream
  2290  )
  2291  
  2292  // RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but
  2293  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  2294  func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  2295  	conn, err := grpc.Dial(endpoint, opts...)
  2296  	if err != nil {
  2297  		return err
  2298  	}
  2299  	defer func() {
  2300  		if err != nil {
  2301  			if cerr := conn.Close(); cerr != nil {
  2302  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2303  			}
  2304  			return
  2305  		}
  2306  		go func() {
  2307  			<-ctx.Done()
  2308  			if cerr := conn.Close(); cerr != nil {
  2309  				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
  2310  			}
  2311  		}()
  2312  	}()
  2313  
  2314  	return RegisterAuthHandler(ctx, mux, conn)
  2315  }
  2316  
  2317  // RegisterAuthHandler registers the http handlers for service Auth to "mux".
  2318  // The handlers forward requests to the grpc endpoint over "conn".
  2319  func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  2320  	return RegisterAuthHandlerClient(ctx, mux, NewAuthClient(conn))
  2321  }
  2322  
  2323  // RegisterAuthHandlerClient registers the http handlers for service Auth
  2324  // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient".
  2325  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient"
  2326  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  2327  // "AuthClient" to call the correct interceptors.
  2328  func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthClient) error {
  2329  
  2330  	mux.Handle("GET", pattern_Auth_HasUsedWeb_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2331  		ctx, cancel := context.WithCancel(req.Context())
  2332  		defer cancel()
  2333  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2334  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/HasUsedWeb")
  2335  		if err != nil {
  2336  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2337  			return
  2338  		}
  2339  		resp, md, err := request_Auth_HasUsedWeb_0(rctx, inboundMarshaler, client, req, pathParams)
  2340  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2341  		if err != nil {
  2342  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2343  			return
  2344  		}
  2345  
  2346  		forward_Auth_HasUsedWeb_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2347  
  2348  	})
  2349  
  2350  	mux.Handle("POST", pattern_Auth_Login_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2351  		ctx, cancel := context.WithCancel(req.Context())
  2352  		defer cancel()
  2353  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2354  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Login")
  2355  		if err != nil {
  2356  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2357  			return
  2358  		}
  2359  		resp, md, err := request_Auth_Login_0(rctx, inboundMarshaler, client, req, pathParams)
  2360  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2361  		if err != nil {
  2362  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2363  			return
  2364  		}
  2365  
  2366  		forward_Auth_Login_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2367  
  2368  	})
  2369  
  2370  	mux.Handle("POST", pattern_Auth_Signup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2371  		ctx, cancel := context.WithCancel(req.Context())
  2372  		defer cancel()
  2373  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2374  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Signup")
  2375  		if err != nil {
  2376  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2377  			return
  2378  		}
  2379  		resp, md, err := request_Auth_Signup_0(rctx, inboundMarshaler, client, req, pathParams)
  2380  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2381  		if err != nil {
  2382  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2383  			return
  2384  		}
  2385  
  2386  		forward_Auth_Signup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2387  
  2388  	})
  2389  
  2390  	mux.Handle("POST", pattern_Auth_Logout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2391  		ctx, cancel := context.WithCancel(req.Context())
  2392  		defer cancel()
  2393  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2394  		rctx, err := runtime.AnnotateContext(ctx, mux, req, "/ethereum.validator.accounts.v2.Auth/Logout")
  2395  		if err != nil {
  2396  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2397  			return
  2398  		}
  2399  		resp, md, err := request_Auth_Logout_0(rctx, inboundMarshaler, client, req, pathParams)
  2400  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2401  		if err != nil {
  2402  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2403  			return
  2404  		}
  2405  
  2406  		forward_Auth_Logout_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2407  
  2408  	})
  2409  
  2410  	return nil
  2411  }
  2412  
  2413  var (
  2414  	pattern_Auth_HasUsedWeb_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "initialized"}, ""))
  2415  
  2416  	pattern_Auth_Login_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "login"}, ""))
  2417  
  2418  	pattern_Auth_Signup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "signup"}, ""))
  2419  
  2420  	pattern_Auth_Logout_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "validator", "logout"}, ""))
  2421  )
  2422  
  2423  var (
  2424  	forward_Auth_HasUsedWeb_0 = runtime.ForwardResponseMessage
  2425  
  2426  	forward_Auth_Login_0 = runtime.ForwardResponseMessage
  2427  
  2428  	forward_Auth_Signup_0 = runtime.ForwardResponseMessage
  2429  
  2430  	forward_Auth_Logout_0 = runtime.ForwardResponseMessage
  2431  )