go.etcd.io/etcd@v3.3.27+incompatible/etcdserver/etcdserverpb/gw/rpc.pb.gw.go (about)

     1  // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
     2  // source: etcdserver/etcdserverpb/rpc.proto
     3  
     4  /*
     5  Package etcdserverpb is a reverse proxy.
     6  
     7  It translates gRPC into RESTful JSON APIs.
     8  */
     9  package gw
    10  
    11  import (
    12  	"github.com/coreos/etcd/etcdserver/etcdserverpb"
    13  	"io"
    14  	"net/http"
    15  
    16  	"github.com/golang/protobuf/proto"
    17  	"github.com/grpc-ecosystem/grpc-gateway/runtime"
    18  	"github.com/grpc-ecosystem/grpc-gateway/utilities"
    19  	"golang.org/x/net/context"
    20  	"google.golang.org/grpc"
    21  	"google.golang.org/grpc/codes"
    22  	"google.golang.org/grpc/grpclog"
    23  	"google.golang.org/grpc/status"
    24  )
    25  
    26  var _ codes.Code
    27  var _ io.Reader
    28  var _ status.Status
    29  var _ = runtime.String
    30  var _ = utilities.NewDoubleArray
    31  
    32  func request_KV_Range_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    33  	var protoReq etcdserverpb.RangeRequest
    34  	var metadata runtime.ServerMetadata
    35  
    36  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
    37  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    38  	}
    39  
    40  	msg, err := client.Range(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    41  	return msg, metadata, err
    42  
    43  }
    44  
    45  func request_KV_Put_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    46  	var protoReq etcdserverpb.PutRequest
    47  	var metadata runtime.ServerMetadata
    48  
    49  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
    50  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    51  	}
    52  
    53  	msg, err := client.Put(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    54  	return msg, metadata, err
    55  
    56  }
    57  
    58  func request_KV_DeleteRange_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    59  	var protoReq etcdserverpb.DeleteRangeRequest
    60  	var metadata runtime.ServerMetadata
    61  
    62  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
    63  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    64  	}
    65  
    66  	msg, err := client.DeleteRange(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    67  	return msg, metadata, err
    68  
    69  }
    70  
    71  func request_KV_Txn_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    72  	var protoReq etcdserverpb.TxnRequest
    73  	var metadata runtime.ServerMetadata
    74  
    75  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
    76  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    77  	}
    78  
    79  	msg, err := client.Txn(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    80  	return msg, metadata, err
    81  
    82  }
    83  
    84  func request_KV_Compact_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
    85  	var protoReq etcdserverpb.CompactionRequest
    86  	var metadata runtime.ServerMetadata
    87  
    88  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
    89  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
    90  	}
    91  
    92  	msg, err := client.Compact(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
    93  	return msg, metadata, err
    94  
    95  }
    96  
    97  func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.WatchClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Watch_WatchClient, runtime.ServerMetadata, error) {
    98  	var metadata runtime.ServerMetadata
    99  	stream, err := client.Watch(ctx)
   100  	if err != nil {
   101  		grpclog.Printf("Failed to start streaming: %v", err)
   102  		return nil, metadata, err
   103  	}
   104  	dec := marshaler.NewDecoder(req.Body)
   105  	handleSend := func() error {
   106  		var protoReq etcdserverpb.WatchRequest
   107  		err = dec.Decode(&protoReq)
   108  		if err == io.EOF {
   109  			return err
   110  		}
   111  		if err != nil {
   112  			grpclog.Printf("Failed to decode request: %v", err)
   113  			return err
   114  		}
   115  		if err = stream.Send(&protoReq); err != nil {
   116  			grpclog.Printf("Failed to send request: %v", err)
   117  			return err
   118  		}
   119  		return nil
   120  	}
   121  	if err := handleSend(); err != nil {
   122  		if cerr := stream.CloseSend(); cerr != nil {
   123  			grpclog.Printf("Failed to terminate client stream: %v", cerr)
   124  		}
   125  		if err == io.EOF {
   126  			return stream, metadata, nil
   127  		}
   128  		return nil, metadata, err
   129  	}
   130  	go func() {
   131  		for {
   132  			if err := handleSend(); err != nil {
   133  				break
   134  			}
   135  		}
   136  		if err := stream.CloseSend(); err != nil {
   137  			grpclog.Printf("Failed to terminate client stream: %v", err)
   138  		}
   139  	}()
   140  	header, err := stream.Header()
   141  	if err != nil {
   142  		grpclog.Printf("Failed to get header from client: %v", err)
   143  		return nil, metadata, err
   144  	}
   145  	metadata.HeaderMD = header
   146  	return stream, metadata, nil
   147  }
   148  
   149  func request_Lease_LeaseGrant_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   150  	var protoReq etcdserverpb.LeaseGrantRequest
   151  	var metadata runtime.ServerMetadata
   152  
   153  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   154  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   155  	}
   156  
   157  	msg, err := client.LeaseGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   158  	return msg, metadata, err
   159  
   160  }
   161  
   162  func request_Lease_LeaseRevoke_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   163  	var protoReq etcdserverpb.LeaseRevokeRequest
   164  	var metadata runtime.ServerMetadata
   165  
   166  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   167  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   168  	}
   169  
   170  	msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   171  	return msg, metadata, err
   172  
   173  }
   174  
   175  func request_Lease_LeaseKeepAlive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Lease_LeaseKeepAliveClient, runtime.ServerMetadata, error) {
   176  	var metadata runtime.ServerMetadata
   177  	stream, err := client.LeaseKeepAlive(ctx)
   178  	if err != nil {
   179  		grpclog.Printf("Failed to start streaming: %v", err)
   180  		return nil, metadata, err
   181  	}
   182  	dec := marshaler.NewDecoder(req.Body)
   183  	handleSend := func() error {
   184  		var protoReq etcdserverpb.LeaseKeepAliveRequest
   185  		err = dec.Decode(&protoReq)
   186  		if err == io.EOF {
   187  			return err
   188  		}
   189  		if err != nil {
   190  			grpclog.Printf("Failed to decode request: %v", err)
   191  			return err
   192  		}
   193  		if err = stream.Send(&protoReq); err != nil {
   194  			grpclog.Printf("Failed to send request: %v", err)
   195  			return err
   196  		}
   197  		return nil
   198  	}
   199  	if err := handleSend(); err != nil {
   200  		if cerr := stream.CloseSend(); cerr != nil {
   201  			grpclog.Printf("Failed to terminate client stream: %v", cerr)
   202  		}
   203  		if err == io.EOF {
   204  			return stream, metadata, nil
   205  		}
   206  		return nil, metadata, err
   207  	}
   208  	go func() {
   209  		for {
   210  			if err := handleSend(); err != nil {
   211  				break
   212  			}
   213  		}
   214  		if err := stream.CloseSend(); err != nil {
   215  			grpclog.Printf("Failed to terminate client stream: %v", err)
   216  		}
   217  	}()
   218  	header, err := stream.Header()
   219  	if err != nil {
   220  		grpclog.Printf("Failed to get header from client: %v", err)
   221  		return nil, metadata, err
   222  	}
   223  	metadata.HeaderMD = header
   224  	return stream, metadata, nil
   225  }
   226  
   227  func request_Lease_LeaseTimeToLive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   228  	var protoReq etcdserverpb.LeaseTimeToLiveRequest
   229  	var metadata runtime.ServerMetadata
   230  
   231  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   232  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   233  	}
   234  
   235  	msg, err := client.LeaseTimeToLive(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   236  	return msg, metadata, err
   237  
   238  }
   239  
   240  func request_Lease_LeaseLeases_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   241  	var protoReq etcdserverpb.LeaseLeasesRequest
   242  	var metadata runtime.ServerMetadata
   243  
   244  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   245  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   246  	}
   247  
   248  	msg, err := client.LeaseLeases(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   249  	return msg, metadata, err
   250  
   251  }
   252  
   253  func request_Cluster_MemberAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   254  	var protoReq etcdserverpb.MemberAddRequest
   255  	var metadata runtime.ServerMetadata
   256  
   257  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   258  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   259  	}
   260  
   261  	msg, err := client.MemberAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   262  	return msg, metadata, err
   263  
   264  }
   265  
   266  func request_Cluster_MemberRemove_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   267  	var protoReq etcdserverpb.MemberRemoveRequest
   268  	var metadata runtime.ServerMetadata
   269  
   270  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   271  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   272  	}
   273  
   274  	msg, err := client.MemberRemove(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   275  	return msg, metadata, err
   276  
   277  }
   278  
   279  func request_Cluster_MemberUpdate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   280  	var protoReq etcdserverpb.MemberUpdateRequest
   281  	var metadata runtime.ServerMetadata
   282  
   283  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   284  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   285  	}
   286  
   287  	msg, err := client.MemberUpdate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   288  	return msg, metadata, err
   289  
   290  }
   291  
   292  func request_Cluster_MemberList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   293  	var protoReq etcdserverpb.MemberListRequest
   294  	var metadata runtime.ServerMetadata
   295  
   296  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   297  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   298  	}
   299  
   300  	msg, err := client.MemberList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   301  	return msg, metadata, err
   302  
   303  }
   304  
   305  func request_Maintenance_Alarm_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   306  	var protoReq etcdserverpb.AlarmRequest
   307  	var metadata runtime.ServerMetadata
   308  
   309  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   310  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   311  	}
   312  
   313  	msg, err := client.Alarm(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   314  	return msg, metadata, err
   315  
   316  }
   317  
   318  func request_Maintenance_Status_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   319  	var protoReq etcdserverpb.StatusRequest
   320  	var metadata runtime.ServerMetadata
   321  
   322  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   323  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   324  	}
   325  
   326  	msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   327  	return msg, metadata, err
   328  
   329  }
   330  
   331  func request_Maintenance_Defragment_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   332  	var protoReq etcdserverpb.DefragmentRequest
   333  	var metadata runtime.ServerMetadata
   334  
   335  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   336  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   337  	}
   338  
   339  	msg, err := client.Defragment(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   340  	return msg, metadata, err
   341  
   342  }
   343  
   344  func request_Maintenance_Hash_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   345  	var protoReq etcdserverpb.HashRequest
   346  	var metadata runtime.ServerMetadata
   347  
   348  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   349  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   350  	}
   351  
   352  	msg, err := client.Hash(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   353  	return msg, metadata, err
   354  
   355  }
   356  
   357  func request_Maintenance_HashKV_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   358  	var protoReq etcdserverpb.HashKVRequest
   359  	var metadata runtime.ServerMetadata
   360  
   361  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   362  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   363  	}
   364  
   365  	msg, err := client.HashKV(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   366  	return msg, metadata, err
   367  
   368  }
   369  
   370  func request_Maintenance_Snapshot_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Maintenance_SnapshotClient, runtime.ServerMetadata, error) {
   371  	var protoReq etcdserverpb.SnapshotRequest
   372  	var metadata runtime.ServerMetadata
   373  
   374  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   375  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   376  	}
   377  
   378  	stream, err := client.Snapshot(ctx, &protoReq)
   379  	if err != nil {
   380  		return nil, metadata, err
   381  	}
   382  	header, err := stream.Header()
   383  	if err != nil {
   384  		return nil, metadata, err
   385  	}
   386  	metadata.HeaderMD = header
   387  	return stream, metadata, nil
   388  
   389  }
   390  
   391  func request_Maintenance_MoveLeader_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   392  	var protoReq etcdserverpb.MoveLeaderRequest
   393  	var metadata runtime.ServerMetadata
   394  
   395  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   396  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   397  	}
   398  
   399  	msg, err := client.MoveLeader(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   400  	return msg, metadata, err
   401  
   402  }
   403  
   404  func request_Auth_AuthEnable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   405  	var protoReq etcdserverpb.AuthEnableRequest
   406  	var metadata runtime.ServerMetadata
   407  
   408  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   409  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   410  	}
   411  
   412  	msg, err := client.AuthEnable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   413  	return msg, metadata, err
   414  
   415  }
   416  
   417  func request_Auth_AuthDisable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   418  	var protoReq etcdserverpb.AuthDisableRequest
   419  	var metadata runtime.ServerMetadata
   420  
   421  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   422  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   423  	}
   424  
   425  	msg, err := client.AuthDisable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   426  	return msg, metadata, err
   427  
   428  }
   429  
   430  func request_Auth_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   431  	var protoReq etcdserverpb.AuthenticateRequest
   432  	var metadata runtime.ServerMetadata
   433  
   434  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   435  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   436  	}
   437  
   438  	msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   439  	return msg, metadata, err
   440  
   441  }
   442  
   443  func request_Auth_UserAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   444  	var protoReq etcdserverpb.AuthUserAddRequest
   445  	var metadata runtime.ServerMetadata
   446  
   447  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   448  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   449  	}
   450  
   451  	msg, err := client.UserAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   452  	return msg, metadata, err
   453  
   454  }
   455  
   456  func request_Auth_UserGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   457  	var protoReq etcdserverpb.AuthUserGetRequest
   458  	var metadata runtime.ServerMetadata
   459  
   460  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   461  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   462  	}
   463  
   464  	msg, err := client.UserGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   465  	return msg, metadata, err
   466  
   467  }
   468  
   469  func request_Auth_UserList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   470  	var protoReq etcdserverpb.AuthUserListRequest
   471  	var metadata runtime.ServerMetadata
   472  
   473  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   474  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   475  	}
   476  
   477  	msg, err := client.UserList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   478  	return msg, metadata, err
   479  
   480  }
   481  
   482  func request_Auth_UserDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   483  	var protoReq etcdserverpb.AuthUserDeleteRequest
   484  	var metadata runtime.ServerMetadata
   485  
   486  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   487  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   488  	}
   489  
   490  	msg, err := client.UserDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   491  	return msg, metadata, err
   492  
   493  }
   494  
   495  func request_Auth_UserChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   496  	var protoReq etcdserverpb.AuthUserChangePasswordRequest
   497  	var metadata runtime.ServerMetadata
   498  
   499  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   500  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   501  	}
   502  
   503  	msg, err := client.UserChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   504  	return msg, metadata, err
   505  
   506  }
   507  
   508  func request_Auth_UserGrantRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   509  	var protoReq etcdserverpb.AuthUserGrantRoleRequest
   510  	var metadata runtime.ServerMetadata
   511  
   512  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   513  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   514  	}
   515  
   516  	msg, err := client.UserGrantRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   517  	return msg, metadata, err
   518  
   519  }
   520  
   521  func request_Auth_UserRevokeRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   522  	var protoReq etcdserverpb.AuthUserRevokeRoleRequest
   523  	var metadata runtime.ServerMetadata
   524  
   525  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   526  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   527  	}
   528  
   529  	msg, err := client.UserRevokeRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   530  	return msg, metadata, err
   531  
   532  }
   533  
   534  func request_Auth_RoleAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   535  	var protoReq etcdserverpb.AuthRoleAddRequest
   536  	var metadata runtime.ServerMetadata
   537  
   538  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   539  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   540  	}
   541  
   542  	msg, err := client.RoleAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   543  	return msg, metadata, err
   544  
   545  }
   546  
   547  func request_Auth_RoleGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   548  	var protoReq etcdserverpb.AuthRoleGetRequest
   549  	var metadata runtime.ServerMetadata
   550  
   551  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   552  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   553  	}
   554  
   555  	msg, err := client.RoleGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   556  	return msg, metadata, err
   557  
   558  }
   559  
   560  func request_Auth_RoleList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   561  	var protoReq etcdserverpb.AuthRoleListRequest
   562  	var metadata runtime.ServerMetadata
   563  
   564  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   565  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   566  	}
   567  
   568  	msg, err := client.RoleList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   569  	return msg, metadata, err
   570  
   571  }
   572  
   573  func request_Auth_RoleDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   574  	var protoReq etcdserverpb.AuthRoleDeleteRequest
   575  	var metadata runtime.ServerMetadata
   576  
   577  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   578  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   579  	}
   580  
   581  	msg, err := client.RoleDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   582  	return msg, metadata, err
   583  
   584  }
   585  
   586  func request_Auth_RoleGrantPermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   587  	var protoReq etcdserverpb.AuthRoleGrantPermissionRequest
   588  	var metadata runtime.ServerMetadata
   589  
   590  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   591  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   592  	}
   593  
   594  	msg, err := client.RoleGrantPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   595  	return msg, metadata, err
   596  
   597  }
   598  
   599  func request_Auth_RoleRevokePermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
   600  	var protoReq etcdserverpb.AuthRoleRevokePermissionRequest
   601  	var metadata runtime.ServerMetadata
   602  
   603  	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
   604  		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
   605  	}
   606  
   607  	msg, err := client.RoleRevokePermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
   608  	return msg, metadata, err
   609  
   610  }
   611  
   612  // RegisterKVHandlerFromEndpoint is same as RegisterKVHandler but
   613  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   614  func RegisterKVHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   615  	conn, err := grpc.Dial(endpoint, opts...)
   616  	if err != nil {
   617  		return err
   618  	}
   619  	defer func() {
   620  		if err != nil {
   621  			if cerr := conn.Close(); cerr != nil {
   622  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   623  			}
   624  			return
   625  		}
   626  		go func() {
   627  			<-ctx.Done()
   628  			if cerr := conn.Close(); cerr != nil {
   629  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   630  			}
   631  		}()
   632  	}()
   633  
   634  	return RegisterKVHandler(ctx, mux, conn)
   635  }
   636  
   637  // RegisterKVHandler registers the http handlers for service KV to "mux".
   638  // The handlers forward requests to the grpc endpoint over "conn".
   639  func RegisterKVHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   640  	return RegisterKVHandlerClient(ctx, mux, etcdserverpb.NewKVClient(conn))
   641  }
   642  
   643  // RegisterKVHandler registers the http handlers for service KV to "mux".
   644  // The handlers forward requests to the grpc endpoint over the given implementation of "KVClient".
   645  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "KVClient"
   646  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   647  // "KVClient" to call the correct interceptors.
   648  func RegisterKVHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.KVClient) error {
   649  
   650  	mux.Handle("POST", pattern_KV_Range_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   651  		ctx, cancel := context.WithCancel(req.Context())
   652  		defer cancel()
   653  		if cn, ok := w.(http.CloseNotifier); ok {
   654  			go func(done <-chan struct{}, closed <-chan bool) {
   655  				select {
   656  				case <-done:
   657  				case <-closed:
   658  					cancel()
   659  				}
   660  			}(ctx.Done(), cn.CloseNotify())
   661  		}
   662  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   663  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   664  		if err != nil {
   665  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   666  			return
   667  		}
   668  		resp, md, err := request_KV_Range_0(rctx, inboundMarshaler, client, req, pathParams)
   669  		ctx = runtime.NewServerMetadataContext(ctx, md)
   670  		if err != nil {
   671  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   672  			return
   673  		}
   674  
   675  		forward_KV_Range_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   676  
   677  	})
   678  
   679  	mux.Handle("POST", pattern_KV_Put_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   680  		ctx, cancel := context.WithCancel(req.Context())
   681  		defer cancel()
   682  		if cn, ok := w.(http.CloseNotifier); ok {
   683  			go func(done <-chan struct{}, closed <-chan bool) {
   684  				select {
   685  				case <-done:
   686  				case <-closed:
   687  					cancel()
   688  				}
   689  			}(ctx.Done(), cn.CloseNotify())
   690  		}
   691  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   692  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   693  		if err != nil {
   694  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   695  			return
   696  		}
   697  		resp, md, err := request_KV_Put_0(rctx, inboundMarshaler, client, req, pathParams)
   698  		ctx = runtime.NewServerMetadataContext(ctx, md)
   699  		if err != nil {
   700  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   701  			return
   702  		}
   703  
   704  		forward_KV_Put_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   705  
   706  	})
   707  
   708  	mux.Handle("POST", pattern_KV_DeleteRange_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   709  		ctx, cancel := context.WithCancel(req.Context())
   710  		defer cancel()
   711  		if cn, ok := w.(http.CloseNotifier); ok {
   712  			go func(done <-chan struct{}, closed <-chan bool) {
   713  				select {
   714  				case <-done:
   715  				case <-closed:
   716  					cancel()
   717  				}
   718  			}(ctx.Done(), cn.CloseNotify())
   719  		}
   720  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   721  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   722  		if err != nil {
   723  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   724  			return
   725  		}
   726  		resp, md, err := request_KV_DeleteRange_0(rctx, inboundMarshaler, client, req, pathParams)
   727  		ctx = runtime.NewServerMetadataContext(ctx, md)
   728  		if err != nil {
   729  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   730  			return
   731  		}
   732  
   733  		forward_KV_DeleteRange_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   734  
   735  	})
   736  
   737  	mux.Handle("POST", pattern_KV_Txn_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   738  		ctx, cancel := context.WithCancel(req.Context())
   739  		defer cancel()
   740  		if cn, ok := w.(http.CloseNotifier); ok {
   741  			go func(done <-chan struct{}, closed <-chan bool) {
   742  				select {
   743  				case <-done:
   744  				case <-closed:
   745  					cancel()
   746  				}
   747  			}(ctx.Done(), cn.CloseNotify())
   748  		}
   749  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   750  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   751  		if err != nil {
   752  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   753  			return
   754  		}
   755  		resp, md, err := request_KV_Txn_0(rctx, inboundMarshaler, client, req, pathParams)
   756  		ctx = runtime.NewServerMetadataContext(ctx, md)
   757  		if err != nil {
   758  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   759  			return
   760  		}
   761  
   762  		forward_KV_Txn_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   763  
   764  	})
   765  
   766  	mux.Handle("POST", pattern_KV_Compact_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   767  		ctx, cancel := context.WithCancel(req.Context())
   768  		defer cancel()
   769  		if cn, ok := w.(http.CloseNotifier); ok {
   770  			go func(done <-chan struct{}, closed <-chan bool) {
   771  				select {
   772  				case <-done:
   773  				case <-closed:
   774  					cancel()
   775  				}
   776  			}(ctx.Done(), cn.CloseNotify())
   777  		}
   778  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   779  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   780  		if err != nil {
   781  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   782  			return
   783  		}
   784  		resp, md, err := request_KV_Compact_0(rctx, inboundMarshaler, client, req, pathParams)
   785  		ctx = runtime.NewServerMetadataContext(ctx, md)
   786  		if err != nil {
   787  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   788  			return
   789  		}
   790  
   791  		forward_KV_Compact_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   792  
   793  	})
   794  
   795  	return nil
   796  }
   797  
   798  var (
   799  	pattern_KV_Range_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "range"}, ""))
   800  
   801  	pattern_KV_Put_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "put"}, ""))
   802  
   803  	pattern_KV_DeleteRange_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "deleterange"}, ""))
   804  
   805  	pattern_KV_Txn_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "txn"}, ""))
   806  
   807  	pattern_KV_Compact_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "compaction"}, ""))
   808  )
   809  
   810  var (
   811  	forward_KV_Range_0 = runtime.ForwardResponseMessage
   812  
   813  	forward_KV_Put_0 = runtime.ForwardResponseMessage
   814  
   815  	forward_KV_DeleteRange_0 = runtime.ForwardResponseMessage
   816  
   817  	forward_KV_Txn_0 = runtime.ForwardResponseMessage
   818  
   819  	forward_KV_Compact_0 = runtime.ForwardResponseMessage
   820  )
   821  
   822  // RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
   823  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   824  func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   825  	conn, err := grpc.Dial(endpoint, opts...)
   826  	if err != nil {
   827  		return err
   828  	}
   829  	defer func() {
   830  		if err != nil {
   831  			if cerr := conn.Close(); cerr != nil {
   832  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   833  			}
   834  			return
   835  		}
   836  		go func() {
   837  			<-ctx.Done()
   838  			if cerr := conn.Close(); cerr != nil {
   839  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   840  			}
   841  		}()
   842  	}()
   843  
   844  	return RegisterWatchHandler(ctx, mux, conn)
   845  }
   846  
   847  // RegisterWatchHandler registers the http handlers for service Watch to "mux".
   848  // The handlers forward requests to the grpc endpoint over "conn".
   849  func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   850  	return RegisterWatchHandlerClient(ctx, mux, etcdserverpb.NewWatchClient(conn))
   851  }
   852  
   853  // RegisterWatchHandler registers the http handlers for service Watch to "mux".
   854  // The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
   855  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
   856  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   857  // "WatchClient" to call the correct interceptors.
   858  func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.WatchClient) error {
   859  
   860  	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   861  		ctx, cancel := context.WithCancel(req.Context())
   862  		defer cancel()
   863  		if cn, ok := w.(http.CloseNotifier); ok {
   864  			go func(done <-chan struct{}, closed <-chan bool) {
   865  				select {
   866  				case <-done:
   867  				case <-closed:
   868  					cancel()
   869  				}
   870  			}(ctx.Done(), cn.CloseNotify())
   871  		}
   872  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   873  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   874  		if err != nil {
   875  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   876  			return
   877  		}
   878  		resp, md, err := request_Watch_Watch_0(rctx, inboundMarshaler, client, req, pathParams)
   879  		ctx = runtime.NewServerMetadataContext(ctx, md)
   880  		if err != nil {
   881  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   882  			return
   883  		}
   884  
   885  		forward_Watch_Watch_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
   886  
   887  	})
   888  
   889  	return nil
   890  }
   891  
   892  var (
   893  	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v3beta", "watch"}, ""))
   894  )
   895  
   896  var (
   897  	forward_Watch_Watch_0 = runtime.ForwardResponseStream
   898  )
   899  
   900  // RegisterLeaseHandlerFromEndpoint is same as RegisterLeaseHandler but
   901  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
   902  func RegisterLeaseHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
   903  	conn, err := grpc.Dial(endpoint, opts...)
   904  	if err != nil {
   905  		return err
   906  	}
   907  	defer func() {
   908  		if err != nil {
   909  			if cerr := conn.Close(); cerr != nil {
   910  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   911  			}
   912  			return
   913  		}
   914  		go func() {
   915  			<-ctx.Done()
   916  			if cerr := conn.Close(); cerr != nil {
   917  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
   918  			}
   919  		}()
   920  	}()
   921  
   922  	return RegisterLeaseHandler(ctx, mux, conn)
   923  }
   924  
   925  // RegisterLeaseHandler registers the http handlers for service Lease to "mux".
   926  // The handlers forward requests to the grpc endpoint over "conn".
   927  func RegisterLeaseHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
   928  	return RegisterLeaseHandlerClient(ctx, mux, etcdserverpb.NewLeaseClient(conn))
   929  }
   930  
   931  // RegisterLeaseHandler registers the http handlers for service Lease to "mux".
   932  // The handlers forward requests to the grpc endpoint over the given implementation of "LeaseClient".
   933  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "LeaseClient"
   934  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
   935  // "LeaseClient" to call the correct interceptors.
   936  func RegisterLeaseHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.LeaseClient) error {
   937  
   938  	mux.Handle("POST", pattern_Lease_LeaseGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   939  		ctx, cancel := context.WithCancel(req.Context())
   940  		defer cancel()
   941  		if cn, ok := w.(http.CloseNotifier); ok {
   942  			go func(done <-chan struct{}, closed <-chan bool) {
   943  				select {
   944  				case <-done:
   945  				case <-closed:
   946  					cancel()
   947  				}
   948  			}(ctx.Done(), cn.CloseNotify())
   949  		}
   950  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   951  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   952  		if err != nil {
   953  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   954  			return
   955  		}
   956  		resp, md, err := request_Lease_LeaseGrant_0(rctx, inboundMarshaler, client, req, pathParams)
   957  		ctx = runtime.NewServerMetadataContext(ctx, md)
   958  		if err != nil {
   959  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   960  			return
   961  		}
   962  
   963  		forward_Lease_LeaseGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   964  
   965  	})
   966  
   967  	mux.Handle("POST", pattern_Lease_LeaseRevoke_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   968  		ctx, cancel := context.WithCancel(req.Context())
   969  		defer cancel()
   970  		if cn, ok := w.(http.CloseNotifier); ok {
   971  			go func(done <-chan struct{}, closed <-chan bool) {
   972  				select {
   973  				case <-done:
   974  				case <-closed:
   975  					cancel()
   976  				}
   977  			}(ctx.Done(), cn.CloseNotify())
   978  		}
   979  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
   980  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
   981  		if err != nil {
   982  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   983  			return
   984  		}
   985  		resp, md, err := request_Lease_LeaseRevoke_0(rctx, inboundMarshaler, client, req, pathParams)
   986  		ctx = runtime.NewServerMetadataContext(ctx, md)
   987  		if err != nil {
   988  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
   989  			return
   990  		}
   991  
   992  		forward_Lease_LeaseRevoke_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
   993  
   994  	})
   995  
   996  	mux.Handle("POST", pattern_Lease_LeaseKeepAlive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
   997  		ctx, cancel := context.WithCancel(req.Context())
   998  		defer cancel()
   999  		if cn, ok := w.(http.CloseNotifier); ok {
  1000  			go func(done <-chan struct{}, closed <-chan bool) {
  1001  				select {
  1002  				case <-done:
  1003  				case <-closed:
  1004  					cancel()
  1005  				}
  1006  			}(ctx.Done(), cn.CloseNotify())
  1007  		}
  1008  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1009  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1010  		if err != nil {
  1011  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1012  			return
  1013  		}
  1014  		resp, md, err := request_Lease_LeaseKeepAlive_0(rctx, inboundMarshaler, client, req, pathParams)
  1015  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1016  		if err != nil {
  1017  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1018  			return
  1019  		}
  1020  
  1021  		forward_Lease_LeaseKeepAlive_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
  1022  
  1023  	})
  1024  
  1025  	mux.Handle("POST", pattern_Lease_LeaseTimeToLive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1026  		ctx, cancel := context.WithCancel(req.Context())
  1027  		defer cancel()
  1028  		if cn, ok := w.(http.CloseNotifier); ok {
  1029  			go func(done <-chan struct{}, closed <-chan bool) {
  1030  				select {
  1031  				case <-done:
  1032  				case <-closed:
  1033  					cancel()
  1034  				}
  1035  			}(ctx.Done(), cn.CloseNotify())
  1036  		}
  1037  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1038  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1039  		if err != nil {
  1040  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1041  			return
  1042  		}
  1043  		resp, md, err := request_Lease_LeaseTimeToLive_0(rctx, inboundMarshaler, client, req, pathParams)
  1044  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1045  		if err != nil {
  1046  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1047  			return
  1048  		}
  1049  
  1050  		forward_Lease_LeaseTimeToLive_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1051  
  1052  	})
  1053  
  1054  	mux.Handle("POST", pattern_Lease_LeaseLeases_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1055  		ctx, cancel := context.WithCancel(req.Context())
  1056  		defer cancel()
  1057  		if cn, ok := w.(http.CloseNotifier); ok {
  1058  			go func(done <-chan struct{}, closed <-chan bool) {
  1059  				select {
  1060  				case <-done:
  1061  				case <-closed:
  1062  					cancel()
  1063  				}
  1064  			}(ctx.Done(), cn.CloseNotify())
  1065  		}
  1066  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1067  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1068  		if err != nil {
  1069  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1070  			return
  1071  		}
  1072  		resp, md, err := request_Lease_LeaseLeases_0(rctx, inboundMarshaler, client, req, pathParams)
  1073  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1074  		if err != nil {
  1075  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1076  			return
  1077  		}
  1078  
  1079  		forward_Lease_LeaseLeases_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1080  
  1081  	})
  1082  
  1083  	return nil
  1084  }
  1085  
  1086  var (
  1087  	pattern_Lease_LeaseGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "grant"}, ""))
  1088  
  1089  	pattern_Lease_LeaseRevoke_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "revoke"}, ""))
  1090  
  1091  	pattern_Lease_LeaseKeepAlive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "keepalive"}, ""))
  1092  
  1093  	pattern_Lease_LeaseTimeToLive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "timetolive"}, ""))
  1094  
  1095  	pattern_Lease_LeaseLeases_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "leases"}, ""))
  1096  )
  1097  
  1098  var (
  1099  	forward_Lease_LeaseGrant_0 = runtime.ForwardResponseMessage
  1100  
  1101  	forward_Lease_LeaseRevoke_0 = runtime.ForwardResponseMessage
  1102  
  1103  	forward_Lease_LeaseKeepAlive_0 = runtime.ForwardResponseStream
  1104  
  1105  	forward_Lease_LeaseTimeToLive_0 = runtime.ForwardResponseMessage
  1106  
  1107  	forward_Lease_LeaseLeases_0 = runtime.ForwardResponseMessage
  1108  )
  1109  
  1110  // RegisterClusterHandlerFromEndpoint is same as RegisterClusterHandler but
  1111  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1112  func RegisterClusterHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1113  	conn, err := grpc.Dial(endpoint, opts...)
  1114  	if err != nil {
  1115  		return err
  1116  	}
  1117  	defer func() {
  1118  		if err != nil {
  1119  			if cerr := conn.Close(); cerr != nil {
  1120  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1121  			}
  1122  			return
  1123  		}
  1124  		go func() {
  1125  			<-ctx.Done()
  1126  			if cerr := conn.Close(); cerr != nil {
  1127  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1128  			}
  1129  		}()
  1130  	}()
  1131  
  1132  	return RegisterClusterHandler(ctx, mux, conn)
  1133  }
  1134  
  1135  // RegisterClusterHandler registers the http handlers for service Cluster to "mux".
  1136  // The handlers forward requests to the grpc endpoint over "conn".
  1137  func RegisterClusterHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1138  	return RegisterClusterHandlerClient(ctx, mux, etcdserverpb.NewClusterClient(conn))
  1139  }
  1140  
  1141  // RegisterClusterHandler registers the http handlers for service Cluster to "mux".
  1142  // The handlers forward requests to the grpc endpoint over the given implementation of "ClusterClient".
  1143  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ClusterClient"
  1144  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1145  // "ClusterClient" to call the correct interceptors.
  1146  func RegisterClusterHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.ClusterClient) error {
  1147  
  1148  	mux.Handle("POST", pattern_Cluster_MemberAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1149  		ctx, cancel := context.WithCancel(req.Context())
  1150  		defer cancel()
  1151  		if cn, ok := w.(http.CloseNotifier); ok {
  1152  			go func(done <-chan struct{}, closed <-chan bool) {
  1153  				select {
  1154  				case <-done:
  1155  				case <-closed:
  1156  					cancel()
  1157  				}
  1158  			}(ctx.Done(), cn.CloseNotify())
  1159  		}
  1160  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1161  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1162  		if err != nil {
  1163  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1164  			return
  1165  		}
  1166  		resp, md, err := request_Cluster_MemberAdd_0(rctx, inboundMarshaler, client, req, pathParams)
  1167  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1168  		if err != nil {
  1169  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1170  			return
  1171  		}
  1172  
  1173  		forward_Cluster_MemberAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1174  
  1175  	})
  1176  
  1177  	mux.Handle("POST", pattern_Cluster_MemberRemove_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1178  		ctx, cancel := context.WithCancel(req.Context())
  1179  		defer cancel()
  1180  		if cn, ok := w.(http.CloseNotifier); ok {
  1181  			go func(done <-chan struct{}, closed <-chan bool) {
  1182  				select {
  1183  				case <-done:
  1184  				case <-closed:
  1185  					cancel()
  1186  				}
  1187  			}(ctx.Done(), cn.CloseNotify())
  1188  		}
  1189  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1190  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1191  		if err != nil {
  1192  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1193  			return
  1194  		}
  1195  		resp, md, err := request_Cluster_MemberRemove_0(rctx, inboundMarshaler, client, req, pathParams)
  1196  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1197  		if err != nil {
  1198  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1199  			return
  1200  		}
  1201  
  1202  		forward_Cluster_MemberRemove_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1203  
  1204  	})
  1205  
  1206  	mux.Handle("POST", pattern_Cluster_MemberUpdate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1207  		ctx, cancel := context.WithCancel(req.Context())
  1208  		defer cancel()
  1209  		if cn, ok := w.(http.CloseNotifier); ok {
  1210  			go func(done <-chan struct{}, closed <-chan bool) {
  1211  				select {
  1212  				case <-done:
  1213  				case <-closed:
  1214  					cancel()
  1215  				}
  1216  			}(ctx.Done(), cn.CloseNotify())
  1217  		}
  1218  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1219  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1220  		if err != nil {
  1221  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1222  			return
  1223  		}
  1224  		resp, md, err := request_Cluster_MemberUpdate_0(rctx, inboundMarshaler, client, req, pathParams)
  1225  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1226  		if err != nil {
  1227  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1228  			return
  1229  		}
  1230  
  1231  		forward_Cluster_MemberUpdate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1232  
  1233  	})
  1234  
  1235  	mux.Handle("POST", pattern_Cluster_MemberList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1236  		ctx, cancel := context.WithCancel(req.Context())
  1237  		defer cancel()
  1238  		if cn, ok := w.(http.CloseNotifier); ok {
  1239  			go func(done <-chan struct{}, closed <-chan bool) {
  1240  				select {
  1241  				case <-done:
  1242  				case <-closed:
  1243  					cancel()
  1244  				}
  1245  			}(ctx.Done(), cn.CloseNotify())
  1246  		}
  1247  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1248  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1249  		if err != nil {
  1250  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1251  			return
  1252  		}
  1253  		resp, md, err := request_Cluster_MemberList_0(rctx, inboundMarshaler, client, req, pathParams)
  1254  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1255  		if err != nil {
  1256  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1257  			return
  1258  		}
  1259  
  1260  		forward_Cluster_MemberList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1261  
  1262  	})
  1263  
  1264  	return nil
  1265  }
  1266  
  1267  var (
  1268  	pattern_Cluster_MemberAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "add"}, ""))
  1269  
  1270  	pattern_Cluster_MemberRemove_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "remove"}, ""))
  1271  
  1272  	pattern_Cluster_MemberUpdate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "update"}, ""))
  1273  
  1274  	pattern_Cluster_MemberList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "list"}, ""))
  1275  )
  1276  
  1277  var (
  1278  	forward_Cluster_MemberAdd_0 = runtime.ForwardResponseMessage
  1279  
  1280  	forward_Cluster_MemberRemove_0 = runtime.ForwardResponseMessage
  1281  
  1282  	forward_Cluster_MemberUpdate_0 = runtime.ForwardResponseMessage
  1283  
  1284  	forward_Cluster_MemberList_0 = runtime.ForwardResponseMessage
  1285  )
  1286  
  1287  // RegisterMaintenanceHandlerFromEndpoint is same as RegisterMaintenanceHandler but
  1288  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1289  func RegisterMaintenanceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1290  	conn, err := grpc.Dial(endpoint, opts...)
  1291  	if err != nil {
  1292  		return err
  1293  	}
  1294  	defer func() {
  1295  		if err != nil {
  1296  			if cerr := conn.Close(); cerr != nil {
  1297  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1298  			}
  1299  			return
  1300  		}
  1301  		go func() {
  1302  			<-ctx.Done()
  1303  			if cerr := conn.Close(); cerr != nil {
  1304  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1305  			}
  1306  		}()
  1307  	}()
  1308  
  1309  	return RegisterMaintenanceHandler(ctx, mux, conn)
  1310  }
  1311  
  1312  // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux".
  1313  // The handlers forward requests to the grpc endpoint over "conn".
  1314  func RegisterMaintenanceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1315  	return RegisterMaintenanceHandlerClient(ctx, mux, etcdserverpb.NewMaintenanceClient(conn))
  1316  }
  1317  
  1318  // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux".
  1319  // The handlers forward requests to the grpc endpoint over the given implementation of "MaintenanceClient".
  1320  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "MaintenanceClient"
  1321  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1322  // "MaintenanceClient" to call the correct interceptors.
  1323  func RegisterMaintenanceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.MaintenanceClient) error {
  1324  
  1325  	mux.Handle("POST", pattern_Maintenance_Alarm_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1326  		ctx, cancel := context.WithCancel(req.Context())
  1327  		defer cancel()
  1328  		if cn, ok := w.(http.CloseNotifier); ok {
  1329  			go func(done <-chan struct{}, closed <-chan bool) {
  1330  				select {
  1331  				case <-done:
  1332  				case <-closed:
  1333  					cancel()
  1334  				}
  1335  			}(ctx.Done(), cn.CloseNotify())
  1336  		}
  1337  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1338  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1339  		if err != nil {
  1340  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1341  			return
  1342  		}
  1343  		resp, md, err := request_Maintenance_Alarm_0(rctx, inboundMarshaler, client, req, pathParams)
  1344  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1345  		if err != nil {
  1346  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1347  			return
  1348  		}
  1349  
  1350  		forward_Maintenance_Alarm_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1351  
  1352  	})
  1353  
  1354  	mux.Handle("POST", pattern_Maintenance_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1355  		ctx, cancel := context.WithCancel(req.Context())
  1356  		defer cancel()
  1357  		if cn, ok := w.(http.CloseNotifier); ok {
  1358  			go func(done <-chan struct{}, closed <-chan bool) {
  1359  				select {
  1360  				case <-done:
  1361  				case <-closed:
  1362  					cancel()
  1363  				}
  1364  			}(ctx.Done(), cn.CloseNotify())
  1365  		}
  1366  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1367  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1368  		if err != nil {
  1369  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1370  			return
  1371  		}
  1372  		resp, md, err := request_Maintenance_Status_0(rctx, inboundMarshaler, client, req, pathParams)
  1373  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1374  		if err != nil {
  1375  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1376  			return
  1377  		}
  1378  
  1379  		forward_Maintenance_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1380  
  1381  	})
  1382  
  1383  	mux.Handle("POST", pattern_Maintenance_Defragment_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1384  		ctx, cancel := context.WithCancel(req.Context())
  1385  		defer cancel()
  1386  		if cn, ok := w.(http.CloseNotifier); ok {
  1387  			go func(done <-chan struct{}, closed <-chan bool) {
  1388  				select {
  1389  				case <-done:
  1390  				case <-closed:
  1391  					cancel()
  1392  				}
  1393  			}(ctx.Done(), cn.CloseNotify())
  1394  		}
  1395  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1396  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1397  		if err != nil {
  1398  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1399  			return
  1400  		}
  1401  		resp, md, err := request_Maintenance_Defragment_0(rctx, inboundMarshaler, client, req, pathParams)
  1402  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1403  		if err != nil {
  1404  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1405  			return
  1406  		}
  1407  
  1408  		forward_Maintenance_Defragment_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1409  
  1410  	})
  1411  
  1412  	mux.Handle("POST", pattern_Maintenance_Hash_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1413  		ctx, cancel := context.WithCancel(req.Context())
  1414  		defer cancel()
  1415  		if cn, ok := w.(http.CloseNotifier); ok {
  1416  			go func(done <-chan struct{}, closed <-chan bool) {
  1417  				select {
  1418  				case <-done:
  1419  				case <-closed:
  1420  					cancel()
  1421  				}
  1422  			}(ctx.Done(), cn.CloseNotify())
  1423  		}
  1424  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1425  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1426  		if err != nil {
  1427  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1428  			return
  1429  		}
  1430  		resp, md, err := request_Maintenance_Hash_0(rctx, inboundMarshaler, client, req, pathParams)
  1431  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1432  		if err != nil {
  1433  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1434  			return
  1435  		}
  1436  
  1437  		forward_Maintenance_Hash_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1438  
  1439  	})
  1440  
  1441  	mux.Handle("POST", pattern_Maintenance_HashKV_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1442  		ctx, cancel := context.WithCancel(req.Context())
  1443  		defer cancel()
  1444  		if cn, ok := w.(http.CloseNotifier); ok {
  1445  			go func(done <-chan struct{}, closed <-chan bool) {
  1446  				select {
  1447  				case <-done:
  1448  				case <-closed:
  1449  					cancel()
  1450  				}
  1451  			}(ctx.Done(), cn.CloseNotify())
  1452  		}
  1453  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1454  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1455  		if err != nil {
  1456  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1457  			return
  1458  		}
  1459  		resp, md, err := request_Maintenance_HashKV_0(rctx, inboundMarshaler, client, req, pathParams)
  1460  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1461  		if err != nil {
  1462  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1463  			return
  1464  		}
  1465  
  1466  		forward_Maintenance_HashKV_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1467  
  1468  	})
  1469  
  1470  	mux.Handle("POST", pattern_Maintenance_Snapshot_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1471  		ctx, cancel := context.WithCancel(req.Context())
  1472  		defer cancel()
  1473  		if cn, ok := w.(http.CloseNotifier); ok {
  1474  			go func(done <-chan struct{}, closed <-chan bool) {
  1475  				select {
  1476  				case <-done:
  1477  				case <-closed:
  1478  					cancel()
  1479  				}
  1480  			}(ctx.Done(), cn.CloseNotify())
  1481  		}
  1482  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1483  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1484  		if err != nil {
  1485  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1486  			return
  1487  		}
  1488  		resp, md, err := request_Maintenance_Snapshot_0(rctx, inboundMarshaler, client, req, pathParams)
  1489  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1490  		if err != nil {
  1491  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1492  			return
  1493  		}
  1494  
  1495  		forward_Maintenance_Snapshot_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
  1496  
  1497  	})
  1498  
  1499  	mux.Handle("POST", pattern_Maintenance_MoveLeader_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1500  		ctx, cancel := context.WithCancel(req.Context())
  1501  		defer cancel()
  1502  		if cn, ok := w.(http.CloseNotifier); ok {
  1503  			go func(done <-chan struct{}, closed <-chan bool) {
  1504  				select {
  1505  				case <-done:
  1506  				case <-closed:
  1507  					cancel()
  1508  				}
  1509  			}(ctx.Done(), cn.CloseNotify())
  1510  		}
  1511  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1512  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1513  		if err != nil {
  1514  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1515  			return
  1516  		}
  1517  		resp, md, err := request_Maintenance_MoveLeader_0(rctx, inboundMarshaler, client, req, pathParams)
  1518  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1519  		if err != nil {
  1520  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1521  			return
  1522  		}
  1523  
  1524  		forward_Maintenance_MoveLeader_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1525  
  1526  	})
  1527  
  1528  	return nil
  1529  }
  1530  
  1531  var (
  1532  	pattern_Maintenance_Alarm_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "alarm"}, ""))
  1533  
  1534  	pattern_Maintenance_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "status"}, ""))
  1535  
  1536  	pattern_Maintenance_Defragment_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "defragment"}, ""))
  1537  
  1538  	pattern_Maintenance_Hash_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, ""))
  1539  
  1540  	pattern_Maintenance_HashKV_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, ""))
  1541  
  1542  	pattern_Maintenance_Snapshot_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "snapshot"}, ""))
  1543  
  1544  	pattern_Maintenance_MoveLeader_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "transfer-leadership"}, ""))
  1545  )
  1546  
  1547  var (
  1548  	forward_Maintenance_Alarm_0 = runtime.ForwardResponseMessage
  1549  
  1550  	forward_Maintenance_Status_0 = runtime.ForwardResponseMessage
  1551  
  1552  	forward_Maintenance_Defragment_0 = runtime.ForwardResponseMessage
  1553  
  1554  	forward_Maintenance_Hash_0 = runtime.ForwardResponseMessage
  1555  
  1556  	forward_Maintenance_HashKV_0 = runtime.ForwardResponseMessage
  1557  
  1558  	forward_Maintenance_Snapshot_0 = runtime.ForwardResponseStream
  1559  
  1560  	forward_Maintenance_MoveLeader_0 = runtime.ForwardResponseMessage
  1561  )
  1562  
  1563  // RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but
  1564  // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  1565  func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  1566  	conn, err := grpc.Dial(endpoint, opts...)
  1567  	if err != nil {
  1568  		return err
  1569  	}
  1570  	defer func() {
  1571  		if err != nil {
  1572  			if cerr := conn.Close(); cerr != nil {
  1573  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1574  			}
  1575  			return
  1576  		}
  1577  		go func() {
  1578  			<-ctx.Done()
  1579  			if cerr := conn.Close(); cerr != nil {
  1580  				grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  1581  			}
  1582  		}()
  1583  	}()
  1584  
  1585  	return RegisterAuthHandler(ctx, mux, conn)
  1586  }
  1587  
  1588  // RegisterAuthHandler registers the http handlers for service Auth to "mux".
  1589  // The handlers forward requests to the grpc endpoint over "conn".
  1590  func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  1591  	return RegisterAuthHandlerClient(ctx, mux, etcdserverpb.NewAuthClient(conn))
  1592  }
  1593  
  1594  // RegisterAuthHandler registers the http handlers for service Auth to "mux".
  1595  // The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient".
  1596  // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient"
  1597  // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
  1598  // "AuthClient" to call the correct interceptors.
  1599  func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.AuthClient) error {
  1600  
  1601  	mux.Handle("POST", pattern_Auth_AuthEnable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1602  		ctx, cancel := context.WithCancel(req.Context())
  1603  		defer cancel()
  1604  		if cn, ok := w.(http.CloseNotifier); ok {
  1605  			go func(done <-chan struct{}, closed <-chan bool) {
  1606  				select {
  1607  				case <-done:
  1608  				case <-closed:
  1609  					cancel()
  1610  				}
  1611  			}(ctx.Done(), cn.CloseNotify())
  1612  		}
  1613  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1614  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1615  		if err != nil {
  1616  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1617  			return
  1618  		}
  1619  		resp, md, err := request_Auth_AuthEnable_0(rctx, inboundMarshaler, client, req, pathParams)
  1620  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1621  		if err != nil {
  1622  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1623  			return
  1624  		}
  1625  
  1626  		forward_Auth_AuthEnable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1627  
  1628  	})
  1629  
  1630  	mux.Handle("POST", pattern_Auth_AuthDisable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1631  		ctx, cancel := context.WithCancel(req.Context())
  1632  		defer cancel()
  1633  		if cn, ok := w.(http.CloseNotifier); ok {
  1634  			go func(done <-chan struct{}, closed <-chan bool) {
  1635  				select {
  1636  				case <-done:
  1637  				case <-closed:
  1638  					cancel()
  1639  				}
  1640  			}(ctx.Done(), cn.CloseNotify())
  1641  		}
  1642  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1643  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1644  		if err != nil {
  1645  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1646  			return
  1647  		}
  1648  		resp, md, err := request_Auth_AuthDisable_0(rctx, inboundMarshaler, client, req, pathParams)
  1649  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1650  		if err != nil {
  1651  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1652  			return
  1653  		}
  1654  
  1655  		forward_Auth_AuthDisable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1656  
  1657  	})
  1658  
  1659  	mux.Handle("POST", pattern_Auth_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1660  		ctx, cancel := context.WithCancel(req.Context())
  1661  		defer cancel()
  1662  		if cn, ok := w.(http.CloseNotifier); ok {
  1663  			go func(done <-chan struct{}, closed <-chan bool) {
  1664  				select {
  1665  				case <-done:
  1666  				case <-closed:
  1667  					cancel()
  1668  				}
  1669  			}(ctx.Done(), cn.CloseNotify())
  1670  		}
  1671  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1672  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1673  		if err != nil {
  1674  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1675  			return
  1676  		}
  1677  		resp, md, err := request_Auth_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams)
  1678  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1679  		if err != nil {
  1680  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1681  			return
  1682  		}
  1683  
  1684  		forward_Auth_Authenticate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1685  
  1686  	})
  1687  
  1688  	mux.Handle("POST", pattern_Auth_UserAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1689  		ctx, cancel := context.WithCancel(req.Context())
  1690  		defer cancel()
  1691  		if cn, ok := w.(http.CloseNotifier); ok {
  1692  			go func(done <-chan struct{}, closed <-chan bool) {
  1693  				select {
  1694  				case <-done:
  1695  				case <-closed:
  1696  					cancel()
  1697  				}
  1698  			}(ctx.Done(), cn.CloseNotify())
  1699  		}
  1700  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1701  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1702  		if err != nil {
  1703  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1704  			return
  1705  		}
  1706  		resp, md, err := request_Auth_UserAdd_0(rctx, inboundMarshaler, client, req, pathParams)
  1707  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1708  		if err != nil {
  1709  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1710  			return
  1711  		}
  1712  
  1713  		forward_Auth_UserAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1714  
  1715  	})
  1716  
  1717  	mux.Handle("POST", pattern_Auth_UserGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1718  		ctx, cancel := context.WithCancel(req.Context())
  1719  		defer cancel()
  1720  		if cn, ok := w.(http.CloseNotifier); ok {
  1721  			go func(done <-chan struct{}, closed <-chan bool) {
  1722  				select {
  1723  				case <-done:
  1724  				case <-closed:
  1725  					cancel()
  1726  				}
  1727  			}(ctx.Done(), cn.CloseNotify())
  1728  		}
  1729  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1730  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1731  		if err != nil {
  1732  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1733  			return
  1734  		}
  1735  		resp, md, err := request_Auth_UserGet_0(rctx, inboundMarshaler, client, req, pathParams)
  1736  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1737  		if err != nil {
  1738  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1739  			return
  1740  		}
  1741  
  1742  		forward_Auth_UserGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1743  
  1744  	})
  1745  
  1746  	mux.Handle("POST", pattern_Auth_UserList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1747  		ctx, cancel := context.WithCancel(req.Context())
  1748  		defer cancel()
  1749  		if cn, ok := w.(http.CloseNotifier); ok {
  1750  			go func(done <-chan struct{}, closed <-chan bool) {
  1751  				select {
  1752  				case <-done:
  1753  				case <-closed:
  1754  					cancel()
  1755  				}
  1756  			}(ctx.Done(), cn.CloseNotify())
  1757  		}
  1758  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1759  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1760  		if err != nil {
  1761  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1762  			return
  1763  		}
  1764  		resp, md, err := request_Auth_UserList_0(rctx, inboundMarshaler, client, req, pathParams)
  1765  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1766  		if err != nil {
  1767  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1768  			return
  1769  		}
  1770  
  1771  		forward_Auth_UserList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1772  
  1773  	})
  1774  
  1775  	mux.Handle("POST", pattern_Auth_UserDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1776  		ctx, cancel := context.WithCancel(req.Context())
  1777  		defer cancel()
  1778  		if cn, ok := w.(http.CloseNotifier); ok {
  1779  			go func(done <-chan struct{}, closed <-chan bool) {
  1780  				select {
  1781  				case <-done:
  1782  				case <-closed:
  1783  					cancel()
  1784  				}
  1785  			}(ctx.Done(), cn.CloseNotify())
  1786  		}
  1787  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1788  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1789  		if err != nil {
  1790  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1791  			return
  1792  		}
  1793  		resp, md, err := request_Auth_UserDelete_0(rctx, inboundMarshaler, client, req, pathParams)
  1794  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1795  		if err != nil {
  1796  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1797  			return
  1798  		}
  1799  
  1800  		forward_Auth_UserDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1801  
  1802  	})
  1803  
  1804  	mux.Handle("POST", pattern_Auth_UserChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1805  		ctx, cancel := context.WithCancel(req.Context())
  1806  		defer cancel()
  1807  		if cn, ok := w.(http.CloseNotifier); ok {
  1808  			go func(done <-chan struct{}, closed <-chan bool) {
  1809  				select {
  1810  				case <-done:
  1811  				case <-closed:
  1812  					cancel()
  1813  				}
  1814  			}(ctx.Done(), cn.CloseNotify())
  1815  		}
  1816  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1817  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1818  		if err != nil {
  1819  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1820  			return
  1821  		}
  1822  		resp, md, err := request_Auth_UserChangePassword_0(rctx, inboundMarshaler, client, req, pathParams)
  1823  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1824  		if err != nil {
  1825  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1826  			return
  1827  		}
  1828  
  1829  		forward_Auth_UserChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1830  
  1831  	})
  1832  
  1833  	mux.Handle("POST", pattern_Auth_UserGrantRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1834  		ctx, cancel := context.WithCancel(req.Context())
  1835  		defer cancel()
  1836  		if cn, ok := w.(http.CloseNotifier); ok {
  1837  			go func(done <-chan struct{}, closed <-chan bool) {
  1838  				select {
  1839  				case <-done:
  1840  				case <-closed:
  1841  					cancel()
  1842  				}
  1843  			}(ctx.Done(), cn.CloseNotify())
  1844  		}
  1845  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1846  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1847  		if err != nil {
  1848  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1849  			return
  1850  		}
  1851  		resp, md, err := request_Auth_UserGrantRole_0(rctx, inboundMarshaler, client, req, pathParams)
  1852  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1853  		if err != nil {
  1854  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1855  			return
  1856  		}
  1857  
  1858  		forward_Auth_UserGrantRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1859  
  1860  	})
  1861  
  1862  	mux.Handle("POST", pattern_Auth_UserRevokeRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1863  		ctx, cancel := context.WithCancel(req.Context())
  1864  		defer cancel()
  1865  		if cn, ok := w.(http.CloseNotifier); ok {
  1866  			go func(done <-chan struct{}, closed <-chan bool) {
  1867  				select {
  1868  				case <-done:
  1869  				case <-closed:
  1870  					cancel()
  1871  				}
  1872  			}(ctx.Done(), cn.CloseNotify())
  1873  		}
  1874  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1875  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1876  		if err != nil {
  1877  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1878  			return
  1879  		}
  1880  		resp, md, err := request_Auth_UserRevokeRole_0(rctx, inboundMarshaler, client, req, pathParams)
  1881  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1882  		if err != nil {
  1883  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1884  			return
  1885  		}
  1886  
  1887  		forward_Auth_UserRevokeRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1888  
  1889  	})
  1890  
  1891  	mux.Handle("POST", pattern_Auth_RoleAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1892  		ctx, cancel := context.WithCancel(req.Context())
  1893  		defer cancel()
  1894  		if cn, ok := w.(http.CloseNotifier); ok {
  1895  			go func(done <-chan struct{}, closed <-chan bool) {
  1896  				select {
  1897  				case <-done:
  1898  				case <-closed:
  1899  					cancel()
  1900  				}
  1901  			}(ctx.Done(), cn.CloseNotify())
  1902  		}
  1903  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1904  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1905  		if err != nil {
  1906  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1907  			return
  1908  		}
  1909  		resp, md, err := request_Auth_RoleAdd_0(rctx, inboundMarshaler, client, req, pathParams)
  1910  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1911  		if err != nil {
  1912  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1913  			return
  1914  		}
  1915  
  1916  		forward_Auth_RoleAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1917  
  1918  	})
  1919  
  1920  	mux.Handle("POST", pattern_Auth_RoleGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1921  		ctx, cancel := context.WithCancel(req.Context())
  1922  		defer cancel()
  1923  		if cn, ok := w.(http.CloseNotifier); ok {
  1924  			go func(done <-chan struct{}, closed <-chan bool) {
  1925  				select {
  1926  				case <-done:
  1927  				case <-closed:
  1928  					cancel()
  1929  				}
  1930  			}(ctx.Done(), cn.CloseNotify())
  1931  		}
  1932  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1933  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1934  		if err != nil {
  1935  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1936  			return
  1937  		}
  1938  		resp, md, err := request_Auth_RoleGet_0(rctx, inboundMarshaler, client, req, pathParams)
  1939  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1940  		if err != nil {
  1941  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1942  			return
  1943  		}
  1944  
  1945  		forward_Auth_RoleGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1946  
  1947  	})
  1948  
  1949  	mux.Handle("POST", pattern_Auth_RoleList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1950  		ctx, cancel := context.WithCancel(req.Context())
  1951  		defer cancel()
  1952  		if cn, ok := w.(http.CloseNotifier); ok {
  1953  			go func(done <-chan struct{}, closed <-chan bool) {
  1954  				select {
  1955  				case <-done:
  1956  				case <-closed:
  1957  					cancel()
  1958  				}
  1959  			}(ctx.Done(), cn.CloseNotify())
  1960  		}
  1961  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1962  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1963  		if err != nil {
  1964  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1965  			return
  1966  		}
  1967  		resp, md, err := request_Auth_RoleList_0(rctx, inboundMarshaler, client, req, pathParams)
  1968  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1969  		if err != nil {
  1970  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1971  			return
  1972  		}
  1973  
  1974  		forward_Auth_RoleList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  1975  
  1976  	})
  1977  
  1978  	mux.Handle("POST", pattern_Auth_RoleDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  1979  		ctx, cancel := context.WithCancel(req.Context())
  1980  		defer cancel()
  1981  		if cn, ok := w.(http.CloseNotifier); ok {
  1982  			go func(done <-chan struct{}, closed <-chan bool) {
  1983  				select {
  1984  				case <-done:
  1985  				case <-closed:
  1986  					cancel()
  1987  				}
  1988  			}(ctx.Done(), cn.CloseNotify())
  1989  		}
  1990  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  1991  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  1992  		if err != nil {
  1993  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  1994  			return
  1995  		}
  1996  		resp, md, err := request_Auth_RoleDelete_0(rctx, inboundMarshaler, client, req, pathParams)
  1997  		ctx = runtime.NewServerMetadataContext(ctx, md)
  1998  		if err != nil {
  1999  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2000  			return
  2001  		}
  2002  
  2003  		forward_Auth_RoleDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2004  
  2005  	})
  2006  
  2007  	mux.Handle("POST", pattern_Auth_RoleGrantPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2008  		ctx, cancel := context.WithCancel(req.Context())
  2009  		defer cancel()
  2010  		if cn, ok := w.(http.CloseNotifier); ok {
  2011  			go func(done <-chan struct{}, closed <-chan bool) {
  2012  				select {
  2013  				case <-done:
  2014  				case <-closed:
  2015  					cancel()
  2016  				}
  2017  			}(ctx.Done(), cn.CloseNotify())
  2018  		}
  2019  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2020  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  2021  		if err != nil {
  2022  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2023  			return
  2024  		}
  2025  		resp, md, err := request_Auth_RoleGrantPermission_0(rctx, inboundMarshaler, client, req, pathParams)
  2026  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2027  		if err != nil {
  2028  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2029  			return
  2030  		}
  2031  
  2032  		forward_Auth_RoleGrantPermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2033  
  2034  	})
  2035  
  2036  	mux.Handle("POST", pattern_Auth_RoleRevokePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  2037  		ctx, cancel := context.WithCancel(req.Context())
  2038  		defer cancel()
  2039  		if cn, ok := w.(http.CloseNotifier); ok {
  2040  			go func(done <-chan struct{}, closed <-chan bool) {
  2041  				select {
  2042  				case <-done:
  2043  				case <-closed:
  2044  					cancel()
  2045  				}
  2046  			}(ctx.Done(), cn.CloseNotify())
  2047  		}
  2048  		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  2049  		rctx, err := runtime.AnnotateContext(ctx, mux, req)
  2050  		if err != nil {
  2051  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2052  			return
  2053  		}
  2054  		resp, md, err := request_Auth_RoleRevokePermission_0(rctx, inboundMarshaler, client, req, pathParams)
  2055  		ctx = runtime.NewServerMetadataContext(ctx, md)
  2056  		if err != nil {
  2057  			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  2058  			return
  2059  		}
  2060  
  2061  		forward_Auth_RoleRevokePermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  2062  
  2063  	})
  2064  
  2065  	return nil
  2066  }
  2067  
  2068  var (
  2069  	pattern_Auth_AuthEnable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "enable"}, ""))
  2070  
  2071  	pattern_Auth_AuthDisable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "disable"}, ""))
  2072  
  2073  	pattern_Auth_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "authenticate"}, ""))
  2074  
  2075  	pattern_Auth_UserAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "add"}, ""))
  2076  
  2077  	pattern_Auth_UserGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "get"}, ""))
  2078  
  2079  	pattern_Auth_UserList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "list"}, ""))
  2080  
  2081  	pattern_Auth_UserDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "delete"}, ""))
  2082  
  2083  	pattern_Auth_UserChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "changepw"}, ""))
  2084  
  2085  	pattern_Auth_UserGrantRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "grant"}, ""))
  2086  
  2087  	pattern_Auth_UserRevokeRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "revoke"}, ""))
  2088  
  2089  	pattern_Auth_RoleAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "add"}, ""))
  2090  
  2091  	pattern_Auth_RoleGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "get"}, ""))
  2092  
  2093  	pattern_Auth_RoleList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "list"}, ""))
  2094  
  2095  	pattern_Auth_RoleDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "delete"}, ""))
  2096  
  2097  	pattern_Auth_RoleGrantPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "grant"}, ""))
  2098  
  2099  	pattern_Auth_RoleRevokePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "revoke"}, ""))
  2100  )
  2101  
  2102  var (
  2103  	forward_Auth_AuthEnable_0 = runtime.ForwardResponseMessage
  2104  
  2105  	forward_Auth_AuthDisable_0 = runtime.ForwardResponseMessage
  2106  
  2107  	forward_Auth_Authenticate_0 = runtime.ForwardResponseMessage
  2108  
  2109  	forward_Auth_UserAdd_0 = runtime.ForwardResponseMessage
  2110  
  2111  	forward_Auth_UserGet_0 = runtime.ForwardResponseMessage
  2112  
  2113  	forward_Auth_UserList_0 = runtime.ForwardResponseMessage
  2114  
  2115  	forward_Auth_UserDelete_0 = runtime.ForwardResponseMessage
  2116  
  2117  	forward_Auth_UserChangePassword_0 = runtime.ForwardResponseMessage
  2118  
  2119  	forward_Auth_UserGrantRole_0 = runtime.ForwardResponseMessage
  2120  
  2121  	forward_Auth_UserRevokeRole_0 = runtime.ForwardResponseMessage
  2122  
  2123  	forward_Auth_RoleAdd_0 = runtime.ForwardResponseMessage
  2124  
  2125  	forward_Auth_RoleGet_0 = runtime.ForwardResponseMessage
  2126  
  2127  	forward_Auth_RoleList_0 = runtime.ForwardResponseMessage
  2128  
  2129  	forward_Auth_RoleDelete_0 = runtime.ForwardResponseMessage
  2130  
  2131  	forward_Auth_RoleGrantPermission_0 = runtime.ForwardResponseMessage
  2132  
  2133  	forward_Auth_RoleRevokePermission_0 = runtime.ForwardResponseMessage
  2134  )