go.etcd.io/etcd@v3.3.27+incompatible/etcdserver/etcdserverpb/gw/rpc.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: etcdserver/etcdserverpb/rpc.proto 3 4 /* 5 Package etcdserverpb is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package gw 10 11 import ( 12 "github.com/coreos/etcd/etcdserver/etcdserverpb" 13 "io" 14 "net/http" 15 16 "github.com/golang/protobuf/proto" 17 "github.com/grpc-ecosystem/grpc-gateway/runtime" 18 "github.com/grpc-ecosystem/grpc-gateway/utilities" 19 "golang.org/x/net/context" 20 "google.golang.org/grpc" 21 "google.golang.org/grpc/codes" 22 "google.golang.org/grpc/grpclog" 23 "google.golang.org/grpc/status" 24 ) 25 26 var _ codes.Code 27 var _ io.Reader 28 var _ status.Status 29 var _ = runtime.String 30 var _ = utilities.NewDoubleArray 31 32 func request_KV_Range_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 33 var protoReq etcdserverpb.RangeRequest 34 var metadata runtime.ServerMetadata 35 36 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 37 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 38 } 39 40 msg, err := client.Range(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 41 return msg, metadata, err 42 43 } 44 45 func request_KV_Put_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 46 var protoReq etcdserverpb.PutRequest 47 var metadata runtime.ServerMetadata 48 49 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 50 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 51 } 52 53 msg, err := client.Put(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 54 return msg, metadata, err 55 56 } 57 58 func request_KV_DeleteRange_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 59 var protoReq etcdserverpb.DeleteRangeRequest 60 var metadata runtime.ServerMetadata 61 62 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 63 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 64 } 65 66 msg, err := client.DeleteRange(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 67 return msg, metadata, err 68 69 } 70 71 func request_KV_Txn_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 72 var protoReq etcdserverpb.TxnRequest 73 var metadata runtime.ServerMetadata 74 75 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 76 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 77 } 78 79 msg, err := client.Txn(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 80 return msg, metadata, err 81 82 } 83 84 func request_KV_Compact_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 85 var protoReq etcdserverpb.CompactionRequest 86 var metadata runtime.ServerMetadata 87 88 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 89 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 90 } 91 92 msg, err := client.Compact(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 93 return msg, metadata, err 94 95 } 96 97 func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.WatchClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Watch_WatchClient, runtime.ServerMetadata, error) { 98 var metadata runtime.ServerMetadata 99 stream, err := client.Watch(ctx) 100 if err != nil { 101 grpclog.Printf("Failed to start streaming: %v", err) 102 return nil, metadata, err 103 } 104 dec := marshaler.NewDecoder(req.Body) 105 handleSend := func() error { 106 var protoReq etcdserverpb.WatchRequest 107 err = dec.Decode(&protoReq) 108 if err == io.EOF { 109 return err 110 } 111 if err != nil { 112 grpclog.Printf("Failed to decode request: %v", err) 113 return err 114 } 115 if err = stream.Send(&protoReq); err != nil { 116 grpclog.Printf("Failed to send request: %v", err) 117 return err 118 } 119 return nil 120 } 121 if err := handleSend(); err != nil { 122 if cerr := stream.CloseSend(); cerr != nil { 123 grpclog.Printf("Failed to terminate client stream: %v", cerr) 124 } 125 if err == io.EOF { 126 return stream, metadata, nil 127 } 128 return nil, metadata, err 129 } 130 go func() { 131 for { 132 if err := handleSend(); err != nil { 133 break 134 } 135 } 136 if err := stream.CloseSend(); err != nil { 137 grpclog.Printf("Failed to terminate client stream: %v", err) 138 } 139 }() 140 header, err := stream.Header() 141 if err != nil { 142 grpclog.Printf("Failed to get header from client: %v", err) 143 return nil, metadata, err 144 } 145 metadata.HeaderMD = header 146 return stream, metadata, nil 147 } 148 149 func request_Lease_LeaseGrant_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 150 var protoReq etcdserverpb.LeaseGrantRequest 151 var metadata runtime.ServerMetadata 152 153 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 154 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 155 } 156 157 msg, err := client.LeaseGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 158 return msg, metadata, err 159 160 } 161 162 func request_Lease_LeaseRevoke_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 163 var protoReq etcdserverpb.LeaseRevokeRequest 164 var metadata runtime.ServerMetadata 165 166 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 167 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 168 } 169 170 msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 171 return msg, metadata, err 172 173 } 174 175 func request_Lease_LeaseKeepAlive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Lease_LeaseKeepAliveClient, runtime.ServerMetadata, error) { 176 var metadata runtime.ServerMetadata 177 stream, err := client.LeaseKeepAlive(ctx) 178 if err != nil { 179 grpclog.Printf("Failed to start streaming: %v", err) 180 return nil, metadata, err 181 } 182 dec := marshaler.NewDecoder(req.Body) 183 handleSend := func() error { 184 var protoReq etcdserverpb.LeaseKeepAliveRequest 185 err = dec.Decode(&protoReq) 186 if err == io.EOF { 187 return err 188 } 189 if err != nil { 190 grpclog.Printf("Failed to decode request: %v", err) 191 return err 192 } 193 if err = stream.Send(&protoReq); err != nil { 194 grpclog.Printf("Failed to send request: %v", err) 195 return err 196 } 197 return nil 198 } 199 if err := handleSend(); err != nil { 200 if cerr := stream.CloseSend(); cerr != nil { 201 grpclog.Printf("Failed to terminate client stream: %v", cerr) 202 } 203 if err == io.EOF { 204 return stream, metadata, nil 205 } 206 return nil, metadata, err 207 } 208 go func() { 209 for { 210 if err := handleSend(); err != nil { 211 break 212 } 213 } 214 if err := stream.CloseSend(); err != nil { 215 grpclog.Printf("Failed to terminate client stream: %v", err) 216 } 217 }() 218 header, err := stream.Header() 219 if err != nil { 220 grpclog.Printf("Failed to get header from client: %v", err) 221 return nil, metadata, err 222 } 223 metadata.HeaderMD = header 224 return stream, metadata, nil 225 } 226 227 func request_Lease_LeaseTimeToLive_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 228 var protoReq etcdserverpb.LeaseTimeToLiveRequest 229 var metadata runtime.ServerMetadata 230 231 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 232 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 233 } 234 235 msg, err := client.LeaseTimeToLive(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 236 return msg, metadata, err 237 238 } 239 240 func request_Lease_LeaseLeases_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 241 var protoReq etcdserverpb.LeaseLeasesRequest 242 var metadata runtime.ServerMetadata 243 244 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 245 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 246 } 247 248 msg, err := client.LeaseLeases(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 249 return msg, metadata, err 250 251 } 252 253 func request_Cluster_MemberAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 254 var protoReq etcdserverpb.MemberAddRequest 255 var metadata runtime.ServerMetadata 256 257 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 258 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 259 } 260 261 msg, err := client.MemberAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 262 return msg, metadata, err 263 264 } 265 266 func request_Cluster_MemberRemove_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 267 var protoReq etcdserverpb.MemberRemoveRequest 268 var metadata runtime.ServerMetadata 269 270 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 271 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 272 } 273 274 msg, err := client.MemberRemove(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 275 return msg, metadata, err 276 277 } 278 279 func request_Cluster_MemberUpdate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 280 var protoReq etcdserverpb.MemberUpdateRequest 281 var metadata runtime.ServerMetadata 282 283 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 284 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 285 } 286 287 msg, err := client.MemberUpdate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 288 return msg, metadata, err 289 290 } 291 292 func request_Cluster_MemberList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 293 var protoReq etcdserverpb.MemberListRequest 294 var metadata runtime.ServerMetadata 295 296 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 297 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 298 } 299 300 msg, err := client.MemberList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 301 return msg, metadata, err 302 303 } 304 305 func request_Maintenance_Alarm_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 306 var protoReq etcdserverpb.AlarmRequest 307 var metadata runtime.ServerMetadata 308 309 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 310 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 311 } 312 313 msg, err := client.Alarm(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 314 return msg, metadata, err 315 316 } 317 318 func request_Maintenance_Status_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 319 var protoReq etcdserverpb.StatusRequest 320 var metadata runtime.ServerMetadata 321 322 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 323 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 324 } 325 326 msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 327 return msg, metadata, err 328 329 } 330 331 func request_Maintenance_Defragment_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 332 var protoReq etcdserverpb.DefragmentRequest 333 var metadata runtime.ServerMetadata 334 335 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 336 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 337 } 338 339 msg, err := client.Defragment(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 340 return msg, metadata, err 341 342 } 343 344 func request_Maintenance_Hash_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 345 var protoReq etcdserverpb.HashRequest 346 var metadata runtime.ServerMetadata 347 348 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 349 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 350 } 351 352 msg, err := client.Hash(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 353 return msg, metadata, err 354 355 } 356 357 func request_Maintenance_HashKV_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 358 var protoReq etcdserverpb.HashKVRequest 359 var metadata runtime.ServerMetadata 360 361 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 362 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 363 } 364 365 msg, err := client.HashKV(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 366 return msg, metadata, err 367 368 } 369 370 func request_Maintenance_Snapshot_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (etcdserverpb.Maintenance_SnapshotClient, runtime.ServerMetadata, error) { 371 var protoReq etcdserverpb.SnapshotRequest 372 var metadata runtime.ServerMetadata 373 374 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 375 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 376 } 377 378 stream, err := client.Snapshot(ctx, &protoReq) 379 if err != nil { 380 return nil, metadata, err 381 } 382 header, err := stream.Header() 383 if err != nil { 384 return nil, metadata, err 385 } 386 metadata.HeaderMD = header 387 return stream, metadata, nil 388 389 } 390 391 func request_Maintenance_MoveLeader_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 392 var protoReq etcdserverpb.MoveLeaderRequest 393 var metadata runtime.ServerMetadata 394 395 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 396 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 397 } 398 399 msg, err := client.MoveLeader(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 400 return msg, metadata, err 401 402 } 403 404 func request_Auth_AuthEnable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 405 var protoReq etcdserverpb.AuthEnableRequest 406 var metadata runtime.ServerMetadata 407 408 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 409 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 410 } 411 412 msg, err := client.AuthEnable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 413 return msg, metadata, err 414 415 } 416 417 func request_Auth_AuthDisable_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 418 var protoReq etcdserverpb.AuthDisableRequest 419 var metadata runtime.ServerMetadata 420 421 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 422 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 423 } 424 425 msg, err := client.AuthDisable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 426 return msg, metadata, err 427 428 } 429 430 func request_Auth_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 431 var protoReq etcdserverpb.AuthenticateRequest 432 var metadata runtime.ServerMetadata 433 434 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 435 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 436 } 437 438 msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 439 return msg, metadata, err 440 441 } 442 443 func request_Auth_UserAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 444 var protoReq etcdserverpb.AuthUserAddRequest 445 var metadata runtime.ServerMetadata 446 447 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 448 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 449 } 450 451 msg, err := client.UserAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 452 return msg, metadata, err 453 454 } 455 456 func request_Auth_UserGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 457 var protoReq etcdserverpb.AuthUserGetRequest 458 var metadata runtime.ServerMetadata 459 460 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 461 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 462 } 463 464 msg, err := client.UserGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 465 return msg, metadata, err 466 467 } 468 469 func request_Auth_UserList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 470 var protoReq etcdserverpb.AuthUserListRequest 471 var metadata runtime.ServerMetadata 472 473 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 474 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 475 } 476 477 msg, err := client.UserList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 478 return msg, metadata, err 479 480 } 481 482 func request_Auth_UserDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 483 var protoReq etcdserverpb.AuthUserDeleteRequest 484 var metadata runtime.ServerMetadata 485 486 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 487 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 488 } 489 490 msg, err := client.UserDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 491 return msg, metadata, err 492 493 } 494 495 func request_Auth_UserChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 496 var protoReq etcdserverpb.AuthUserChangePasswordRequest 497 var metadata runtime.ServerMetadata 498 499 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 500 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 501 } 502 503 msg, err := client.UserChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 504 return msg, metadata, err 505 506 } 507 508 func request_Auth_UserGrantRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 509 var protoReq etcdserverpb.AuthUserGrantRoleRequest 510 var metadata runtime.ServerMetadata 511 512 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 513 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 514 } 515 516 msg, err := client.UserGrantRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 517 return msg, metadata, err 518 519 } 520 521 func request_Auth_UserRevokeRole_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 522 var protoReq etcdserverpb.AuthUserRevokeRoleRequest 523 var metadata runtime.ServerMetadata 524 525 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 526 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 527 } 528 529 msg, err := client.UserRevokeRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 530 return msg, metadata, err 531 532 } 533 534 func request_Auth_RoleAdd_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 535 var protoReq etcdserverpb.AuthRoleAddRequest 536 var metadata runtime.ServerMetadata 537 538 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 539 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 540 } 541 542 msg, err := client.RoleAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 543 return msg, metadata, err 544 545 } 546 547 func request_Auth_RoleGet_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 548 var protoReq etcdserverpb.AuthRoleGetRequest 549 var metadata runtime.ServerMetadata 550 551 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 552 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 553 } 554 555 msg, err := client.RoleGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 556 return msg, metadata, err 557 558 } 559 560 func request_Auth_RoleList_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 561 var protoReq etcdserverpb.AuthRoleListRequest 562 var metadata runtime.ServerMetadata 563 564 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 565 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 566 } 567 568 msg, err := client.RoleList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 569 return msg, metadata, err 570 571 } 572 573 func request_Auth_RoleDelete_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 574 var protoReq etcdserverpb.AuthRoleDeleteRequest 575 var metadata runtime.ServerMetadata 576 577 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 578 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 579 } 580 581 msg, err := client.RoleDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 582 return msg, metadata, err 583 584 } 585 586 func request_Auth_RoleGrantPermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 587 var protoReq etcdserverpb.AuthRoleGrantPermissionRequest 588 var metadata runtime.ServerMetadata 589 590 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 591 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 592 } 593 594 msg, err := client.RoleGrantPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 595 return msg, metadata, err 596 597 } 598 599 func request_Auth_RoleRevokePermission_0(ctx context.Context, marshaler runtime.Marshaler, client etcdserverpb.AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 600 var protoReq etcdserverpb.AuthRoleRevokePermissionRequest 601 var metadata runtime.ServerMetadata 602 603 if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil { 604 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 605 } 606 607 msg, err := client.RoleRevokePermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 608 return msg, metadata, err 609 610 } 611 612 // RegisterKVHandlerFromEndpoint is same as RegisterKVHandler but 613 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 614 func RegisterKVHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 615 conn, err := grpc.Dial(endpoint, opts...) 616 if err != nil { 617 return err 618 } 619 defer func() { 620 if err != nil { 621 if cerr := conn.Close(); cerr != nil { 622 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 623 } 624 return 625 } 626 go func() { 627 <-ctx.Done() 628 if cerr := conn.Close(); cerr != nil { 629 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 630 } 631 }() 632 }() 633 634 return RegisterKVHandler(ctx, mux, conn) 635 } 636 637 // RegisterKVHandler registers the http handlers for service KV to "mux". 638 // The handlers forward requests to the grpc endpoint over "conn". 639 func RegisterKVHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 640 return RegisterKVHandlerClient(ctx, mux, etcdserverpb.NewKVClient(conn)) 641 } 642 643 // RegisterKVHandler registers the http handlers for service KV to "mux". 644 // The handlers forward requests to the grpc endpoint over the given implementation of "KVClient". 645 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "KVClient" 646 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 647 // "KVClient" to call the correct interceptors. 648 func RegisterKVHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.KVClient) error { 649 650 mux.Handle("POST", pattern_KV_Range_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 651 ctx, cancel := context.WithCancel(req.Context()) 652 defer cancel() 653 if cn, ok := w.(http.CloseNotifier); ok { 654 go func(done <-chan struct{}, closed <-chan bool) { 655 select { 656 case <-done: 657 case <-closed: 658 cancel() 659 } 660 }(ctx.Done(), cn.CloseNotify()) 661 } 662 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 663 rctx, err := runtime.AnnotateContext(ctx, mux, req) 664 if err != nil { 665 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 666 return 667 } 668 resp, md, err := request_KV_Range_0(rctx, inboundMarshaler, client, req, pathParams) 669 ctx = runtime.NewServerMetadataContext(ctx, md) 670 if err != nil { 671 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 672 return 673 } 674 675 forward_KV_Range_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 676 677 }) 678 679 mux.Handle("POST", pattern_KV_Put_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 680 ctx, cancel := context.WithCancel(req.Context()) 681 defer cancel() 682 if cn, ok := w.(http.CloseNotifier); ok { 683 go func(done <-chan struct{}, closed <-chan bool) { 684 select { 685 case <-done: 686 case <-closed: 687 cancel() 688 } 689 }(ctx.Done(), cn.CloseNotify()) 690 } 691 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 692 rctx, err := runtime.AnnotateContext(ctx, mux, req) 693 if err != nil { 694 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 695 return 696 } 697 resp, md, err := request_KV_Put_0(rctx, inboundMarshaler, client, req, pathParams) 698 ctx = runtime.NewServerMetadataContext(ctx, md) 699 if err != nil { 700 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 701 return 702 } 703 704 forward_KV_Put_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 705 706 }) 707 708 mux.Handle("POST", pattern_KV_DeleteRange_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 709 ctx, cancel := context.WithCancel(req.Context()) 710 defer cancel() 711 if cn, ok := w.(http.CloseNotifier); ok { 712 go func(done <-chan struct{}, closed <-chan bool) { 713 select { 714 case <-done: 715 case <-closed: 716 cancel() 717 } 718 }(ctx.Done(), cn.CloseNotify()) 719 } 720 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 721 rctx, err := runtime.AnnotateContext(ctx, mux, req) 722 if err != nil { 723 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 724 return 725 } 726 resp, md, err := request_KV_DeleteRange_0(rctx, inboundMarshaler, client, req, pathParams) 727 ctx = runtime.NewServerMetadataContext(ctx, md) 728 if err != nil { 729 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 730 return 731 } 732 733 forward_KV_DeleteRange_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 734 735 }) 736 737 mux.Handle("POST", pattern_KV_Txn_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 738 ctx, cancel := context.WithCancel(req.Context()) 739 defer cancel() 740 if cn, ok := w.(http.CloseNotifier); ok { 741 go func(done <-chan struct{}, closed <-chan bool) { 742 select { 743 case <-done: 744 case <-closed: 745 cancel() 746 } 747 }(ctx.Done(), cn.CloseNotify()) 748 } 749 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 750 rctx, err := runtime.AnnotateContext(ctx, mux, req) 751 if err != nil { 752 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 753 return 754 } 755 resp, md, err := request_KV_Txn_0(rctx, inboundMarshaler, client, req, pathParams) 756 ctx = runtime.NewServerMetadataContext(ctx, md) 757 if err != nil { 758 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 759 return 760 } 761 762 forward_KV_Txn_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 763 764 }) 765 766 mux.Handle("POST", pattern_KV_Compact_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 767 ctx, cancel := context.WithCancel(req.Context()) 768 defer cancel() 769 if cn, ok := w.(http.CloseNotifier); ok { 770 go func(done <-chan struct{}, closed <-chan bool) { 771 select { 772 case <-done: 773 case <-closed: 774 cancel() 775 } 776 }(ctx.Done(), cn.CloseNotify()) 777 } 778 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 779 rctx, err := runtime.AnnotateContext(ctx, mux, req) 780 if err != nil { 781 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 782 return 783 } 784 resp, md, err := request_KV_Compact_0(rctx, inboundMarshaler, client, req, pathParams) 785 ctx = runtime.NewServerMetadataContext(ctx, md) 786 if err != nil { 787 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 788 return 789 } 790 791 forward_KV_Compact_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 792 793 }) 794 795 return nil 796 } 797 798 var ( 799 pattern_KV_Range_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "range"}, "")) 800 801 pattern_KV_Put_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "put"}, "")) 802 803 pattern_KV_DeleteRange_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "deleterange"}, "")) 804 805 pattern_KV_Txn_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "txn"}, "")) 806 807 pattern_KV_Compact_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "kv", "compaction"}, "")) 808 ) 809 810 var ( 811 forward_KV_Range_0 = runtime.ForwardResponseMessage 812 813 forward_KV_Put_0 = runtime.ForwardResponseMessage 814 815 forward_KV_DeleteRange_0 = runtime.ForwardResponseMessage 816 817 forward_KV_Txn_0 = runtime.ForwardResponseMessage 818 819 forward_KV_Compact_0 = runtime.ForwardResponseMessage 820 ) 821 822 // RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but 823 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 824 func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 825 conn, err := grpc.Dial(endpoint, opts...) 826 if err != nil { 827 return err 828 } 829 defer func() { 830 if err != nil { 831 if cerr := conn.Close(); cerr != nil { 832 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 833 } 834 return 835 } 836 go func() { 837 <-ctx.Done() 838 if cerr := conn.Close(); cerr != nil { 839 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 840 } 841 }() 842 }() 843 844 return RegisterWatchHandler(ctx, mux, conn) 845 } 846 847 // RegisterWatchHandler registers the http handlers for service Watch to "mux". 848 // The handlers forward requests to the grpc endpoint over "conn". 849 func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 850 return RegisterWatchHandlerClient(ctx, mux, etcdserverpb.NewWatchClient(conn)) 851 } 852 853 // RegisterWatchHandler registers the http handlers for service Watch to "mux". 854 // The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient". 855 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient" 856 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 857 // "WatchClient" to call the correct interceptors. 858 func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.WatchClient) error { 859 860 mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 861 ctx, cancel := context.WithCancel(req.Context()) 862 defer cancel() 863 if cn, ok := w.(http.CloseNotifier); ok { 864 go func(done <-chan struct{}, closed <-chan bool) { 865 select { 866 case <-done: 867 case <-closed: 868 cancel() 869 } 870 }(ctx.Done(), cn.CloseNotify()) 871 } 872 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 873 rctx, err := runtime.AnnotateContext(ctx, mux, req) 874 if err != nil { 875 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 876 return 877 } 878 resp, md, err := request_Watch_Watch_0(rctx, inboundMarshaler, client, req, pathParams) 879 ctx = runtime.NewServerMetadataContext(ctx, md) 880 if err != nil { 881 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 882 return 883 } 884 885 forward_Watch_Watch_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 886 887 }) 888 889 return nil 890 } 891 892 var ( 893 pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v3beta", "watch"}, "")) 894 ) 895 896 var ( 897 forward_Watch_Watch_0 = runtime.ForwardResponseStream 898 ) 899 900 // RegisterLeaseHandlerFromEndpoint is same as RegisterLeaseHandler but 901 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 902 func RegisterLeaseHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 903 conn, err := grpc.Dial(endpoint, opts...) 904 if err != nil { 905 return err 906 } 907 defer func() { 908 if err != nil { 909 if cerr := conn.Close(); cerr != nil { 910 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 911 } 912 return 913 } 914 go func() { 915 <-ctx.Done() 916 if cerr := conn.Close(); cerr != nil { 917 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 918 } 919 }() 920 }() 921 922 return RegisterLeaseHandler(ctx, mux, conn) 923 } 924 925 // RegisterLeaseHandler registers the http handlers for service Lease to "mux". 926 // The handlers forward requests to the grpc endpoint over "conn". 927 func RegisterLeaseHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 928 return RegisterLeaseHandlerClient(ctx, mux, etcdserverpb.NewLeaseClient(conn)) 929 } 930 931 // RegisterLeaseHandler registers the http handlers for service Lease to "mux". 932 // The handlers forward requests to the grpc endpoint over the given implementation of "LeaseClient". 933 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "LeaseClient" 934 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 935 // "LeaseClient" to call the correct interceptors. 936 func RegisterLeaseHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.LeaseClient) error { 937 938 mux.Handle("POST", pattern_Lease_LeaseGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 939 ctx, cancel := context.WithCancel(req.Context()) 940 defer cancel() 941 if cn, ok := w.(http.CloseNotifier); ok { 942 go func(done <-chan struct{}, closed <-chan bool) { 943 select { 944 case <-done: 945 case <-closed: 946 cancel() 947 } 948 }(ctx.Done(), cn.CloseNotify()) 949 } 950 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 951 rctx, err := runtime.AnnotateContext(ctx, mux, req) 952 if err != nil { 953 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 954 return 955 } 956 resp, md, err := request_Lease_LeaseGrant_0(rctx, inboundMarshaler, client, req, pathParams) 957 ctx = runtime.NewServerMetadataContext(ctx, md) 958 if err != nil { 959 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 960 return 961 } 962 963 forward_Lease_LeaseGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 964 965 }) 966 967 mux.Handle("POST", pattern_Lease_LeaseRevoke_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 968 ctx, cancel := context.WithCancel(req.Context()) 969 defer cancel() 970 if cn, ok := w.(http.CloseNotifier); ok { 971 go func(done <-chan struct{}, closed <-chan bool) { 972 select { 973 case <-done: 974 case <-closed: 975 cancel() 976 } 977 }(ctx.Done(), cn.CloseNotify()) 978 } 979 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 980 rctx, err := runtime.AnnotateContext(ctx, mux, req) 981 if err != nil { 982 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 983 return 984 } 985 resp, md, err := request_Lease_LeaseRevoke_0(rctx, inboundMarshaler, client, req, pathParams) 986 ctx = runtime.NewServerMetadataContext(ctx, md) 987 if err != nil { 988 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 989 return 990 } 991 992 forward_Lease_LeaseRevoke_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 993 994 }) 995 996 mux.Handle("POST", pattern_Lease_LeaseKeepAlive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 997 ctx, cancel := context.WithCancel(req.Context()) 998 defer cancel() 999 if cn, ok := w.(http.CloseNotifier); ok { 1000 go func(done <-chan struct{}, closed <-chan bool) { 1001 select { 1002 case <-done: 1003 case <-closed: 1004 cancel() 1005 } 1006 }(ctx.Done(), cn.CloseNotify()) 1007 } 1008 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1009 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1010 if err != nil { 1011 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1012 return 1013 } 1014 resp, md, err := request_Lease_LeaseKeepAlive_0(rctx, inboundMarshaler, client, req, pathParams) 1015 ctx = runtime.NewServerMetadataContext(ctx, md) 1016 if err != nil { 1017 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1018 return 1019 } 1020 1021 forward_Lease_LeaseKeepAlive_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 1022 1023 }) 1024 1025 mux.Handle("POST", pattern_Lease_LeaseTimeToLive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1026 ctx, cancel := context.WithCancel(req.Context()) 1027 defer cancel() 1028 if cn, ok := w.(http.CloseNotifier); ok { 1029 go func(done <-chan struct{}, closed <-chan bool) { 1030 select { 1031 case <-done: 1032 case <-closed: 1033 cancel() 1034 } 1035 }(ctx.Done(), cn.CloseNotify()) 1036 } 1037 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1038 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1039 if err != nil { 1040 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1041 return 1042 } 1043 resp, md, err := request_Lease_LeaseTimeToLive_0(rctx, inboundMarshaler, client, req, pathParams) 1044 ctx = runtime.NewServerMetadataContext(ctx, md) 1045 if err != nil { 1046 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1047 return 1048 } 1049 1050 forward_Lease_LeaseTimeToLive_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1051 1052 }) 1053 1054 mux.Handle("POST", pattern_Lease_LeaseLeases_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1055 ctx, cancel := context.WithCancel(req.Context()) 1056 defer cancel() 1057 if cn, ok := w.(http.CloseNotifier); ok { 1058 go func(done <-chan struct{}, closed <-chan bool) { 1059 select { 1060 case <-done: 1061 case <-closed: 1062 cancel() 1063 } 1064 }(ctx.Done(), cn.CloseNotify()) 1065 } 1066 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1067 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1068 if err != nil { 1069 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1070 return 1071 } 1072 resp, md, err := request_Lease_LeaseLeases_0(rctx, inboundMarshaler, client, req, pathParams) 1073 ctx = runtime.NewServerMetadataContext(ctx, md) 1074 if err != nil { 1075 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1076 return 1077 } 1078 1079 forward_Lease_LeaseLeases_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1080 1081 }) 1082 1083 return nil 1084 } 1085 1086 var ( 1087 pattern_Lease_LeaseGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "grant"}, "")) 1088 1089 pattern_Lease_LeaseRevoke_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "revoke"}, "")) 1090 1091 pattern_Lease_LeaseKeepAlive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "lease", "keepalive"}, "")) 1092 1093 pattern_Lease_LeaseTimeToLive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "timetolive"}, "")) 1094 1095 pattern_Lease_LeaseLeases_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "kv", "lease", "leases"}, "")) 1096 ) 1097 1098 var ( 1099 forward_Lease_LeaseGrant_0 = runtime.ForwardResponseMessage 1100 1101 forward_Lease_LeaseRevoke_0 = runtime.ForwardResponseMessage 1102 1103 forward_Lease_LeaseKeepAlive_0 = runtime.ForwardResponseStream 1104 1105 forward_Lease_LeaseTimeToLive_0 = runtime.ForwardResponseMessage 1106 1107 forward_Lease_LeaseLeases_0 = runtime.ForwardResponseMessage 1108 ) 1109 1110 // RegisterClusterHandlerFromEndpoint is same as RegisterClusterHandler but 1111 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1112 func RegisterClusterHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1113 conn, err := grpc.Dial(endpoint, opts...) 1114 if err != nil { 1115 return err 1116 } 1117 defer func() { 1118 if err != nil { 1119 if cerr := conn.Close(); cerr != nil { 1120 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1121 } 1122 return 1123 } 1124 go func() { 1125 <-ctx.Done() 1126 if cerr := conn.Close(); cerr != nil { 1127 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1128 } 1129 }() 1130 }() 1131 1132 return RegisterClusterHandler(ctx, mux, conn) 1133 } 1134 1135 // RegisterClusterHandler registers the http handlers for service Cluster to "mux". 1136 // The handlers forward requests to the grpc endpoint over "conn". 1137 func RegisterClusterHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1138 return RegisterClusterHandlerClient(ctx, mux, etcdserverpb.NewClusterClient(conn)) 1139 } 1140 1141 // RegisterClusterHandler registers the http handlers for service Cluster to "mux". 1142 // The handlers forward requests to the grpc endpoint over the given implementation of "ClusterClient". 1143 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ClusterClient" 1144 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1145 // "ClusterClient" to call the correct interceptors. 1146 func RegisterClusterHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.ClusterClient) error { 1147 1148 mux.Handle("POST", pattern_Cluster_MemberAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1149 ctx, cancel := context.WithCancel(req.Context()) 1150 defer cancel() 1151 if cn, ok := w.(http.CloseNotifier); ok { 1152 go func(done <-chan struct{}, closed <-chan bool) { 1153 select { 1154 case <-done: 1155 case <-closed: 1156 cancel() 1157 } 1158 }(ctx.Done(), cn.CloseNotify()) 1159 } 1160 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1161 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1162 if err != nil { 1163 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1164 return 1165 } 1166 resp, md, err := request_Cluster_MemberAdd_0(rctx, inboundMarshaler, client, req, pathParams) 1167 ctx = runtime.NewServerMetadataContext(ctx, md) 1168 if err != nil { 1169 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1170 return 1171 } 1172 1173 forward_Cluster_MemberAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1174 1175 }) 1176 1177 mux.Handle("POST", pattern_Cluster_MemberRemove_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1178 ctx, cancel := context.WithCancel(req.Context()) 1179 defer cancel() 1180 if cn, ok := w.(http.CloseNotifier); ok { 1181 go func(done <-chan struct{}, closed <-chan bool) { 1182 select { 1183 case <-done: 1184 case <-closed: 1185 cancel() 1186 } 1187 }(ctx.Done(), cn.CloseNotify()) 1188 } 1189 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1190 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1191 if err != nil { 1192 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1193 return 1194 } 1195 resp, md, err := request_Cluster_MemberRemove_0(rctx, inboundMarshaler, client, req, pathParams) 1196 ctx = runtime.NewServerMetadataContext(ctx, md) 1197 if err != nil { 1198 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1199 return 1200 } 1201 1202 forward_Cluster_MemberRemove_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1203 1204 }) 1205 1206 mux.Handle("POST", pattern_Cluster_MemberUpdate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1207 ctx, cancel := context.WithCancel(req.Context()) 1208 defer cancel() 1209 if cn, ok := w.(http.CloseNotifier); ok { 1210 go func(done <-chan struct{}, closed <-chan bool) { 1211 select { 1212 case <-done: 1213 case <-closed: 1214 cancel() 1215 } 1216 }(ctx.Done(), cn.CloseNotify()) 1217 } 1218 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1219 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1220 if err != nil { 1221 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1222 return 1223 } 1224 resp, md, err := request_Cluster_MemberUpdate_0(rctx, inboundMarshaler, client, req, pathParams) 1225 ctx = runtime.NewServerMetadataContext(ctx, md) 1226 if err != nil { 1227 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1228 return 1229 } 1230 1231 forward_Cluster_MemberUpdate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1232 1233 }) 1234 1235 mux.Handle("POST", pattern_Cluster_MemberList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1236 ctx, cancel := context.WithCancel(req.Context()) 1237 defer cancel() 1238 if cn, ok := w.(http.CloseNotifier); ok { 1239 go func(done <-chan struct{}, closed <-chan bool) { 1240 select { 1241 case <-done: 1242 case <-closed: 1243 cancel() 1244 } 1245 }(ctx.Done(), cn.CloseNotify()) 1246 } 1247 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1248 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1249 if err != nil { 1250 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1251 return 1252 } 1253 resp, md, err := request_Cluster_MemberList_0(rctx, inboundMarshaler, client, req, pathParams) 1254 ctx = runtime.NewServerMetadataContext(ctx, md) 1255 if err != nil { 1256 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1257 return 1258 } 1259 1260 forward_Cluster_MemberList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1261 1262 }) 1263 1264 return nil 1265 } 1266 1267 var ( 1268 pattern_Cluster_MemberAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "add"}, "")) 1269 1270 pattern_Cluster_MemberRemove_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "remove"}, "")) 1271 1272 pattern_Cluster_MemberUpdate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "update"}, "")) 1273 1274 pattern_Cluster_MemberList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "cluster", "member", "list"}, "")) 1275 ) 1276 1277 var ( 1278 forward_Cluster_MemberAdd_0 = runtime.ForwardResponseMessage 1279 1280 forward_Cluster_MemberRemove_0 = runtime.ForwardResponseMessage 1281 1282 forward_Cluster_MemberUpdate_0 = runtime.ForwardResponseMessage 1283 1284 forward_Cluster_MemberList_0 = runtime.ForwardResponseMessage 1285 ) 1286 1287 // RegisterMaintenanceHandlerFromEndpoint is same as RegisterMaintenanceHandler but 1288 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1289 func RegisterMaintenanceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1290 conn, err := grpc.Dial(endpoint, opts...) 1291 if err != nil { 1292 return err 1293 } 1294 defer func() { 1295 if err != nil { 1296 if cerr := conn.Close(); cerr != nil { 1297 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1298 } 1299 return 1300 } 1301 go func() { 1302 <-ctx.Done() 1303 if cerr := conn.Close(); cerr != nil { 1304 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1305 } 1306 }() 1307 }() 1308 1309 return RegisterMaintenanceHandler(ctx, mux, conn) 1310 } 1311 1312 // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux". 1313 // The handlers forward requests to the grpc endpoint over "conn". 1314 func RegisterMaintenanceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1315 return RegisterMaintenanceHandlerClient(ctx, mux, etcdserverpb.NewMaintenanceClient(conn)) 1316 } 1317 1318 // RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux". 1319 // The handlers forward requests to the grpc endpoint over the given implementation of "MaintenanceClient". 1320 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "MaintenanceClient" 1321 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1322 // "MaintenanceClient" to call the correct interceptors. 1323 func RegisterMaintenanceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.MaintenanceClient) error { 1324 1325 mux.Handle("POST", pattern_Maintenance_Alarm_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1326 ctx, cancel := context.WithCancel(req.Context()) 1327 defer cancel() 1328 if cn, ok := w.(http.CloseNotifier); ok { 1329 go func(done <-chan struct{}, closed <-chan bool) { 1330 select { 1331 case <-done: 1332 case <-closed: 1333 cancel() 1334 } 1335 }(ctx.Done(), cn.CloseNotify()) 1336 } 1337 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1338 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1339 if err != nil { 1340 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1341 return 1342 } 1343 resp, md, err := request_Maintenance_Alarm_0(rctx, inboundMarshaler, client, req, pathParams) 1344 ctx = runtime.NewServerMetadataContext(ctx, md) 1345 if err != nil { 1346 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1347 return 1348 } 1349 1350 forward_Maintenance_Alarm_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1351 1352 }) 1353 1354 mux.Handle("POST", pattern_Maintenance_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1355 ctx, cancel := context.WithCancel(req.Context()) 1356 defer cancel() 1357 if cn, ok := w.(http.CloseNotifier); ok { 1358 go func(done <-chan struct{}, closed <-chan bool) { 1359 select { 1360 case <-done: 1361 case <-closed: 1362 cancel() 1363 } 1364 }(ctx.Done(), cn.CloseNotify()) 1365 } 1366 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1367 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1368 if err != nil { 1369 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1370 return 1371 } 1372 resp, md, err := request_Maintenance_Status_0(rctx, inboundMarshaler, client, req, pathParams) 1373 ctx = runtime.NewServerMetadataContext(ctx, md) 1374 if err != nil { 1375 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1376 return 1377 } 1378 1379 forward_Maintenance_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1380 1381 }) 1382 1383 mux.Handle("POST", pattern_Maintenance_Defragment_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1384 ctx, cancel := context.WithCancel(req.Context()) 1385 defer cancel() 1386 if cn, ok := w.(http.CloseNotifier); ok { 1387 go func(done <-chan struct{}, closed <-chan bool) { 1388 select { 1389 case <-done: 1390 case <-closed: 1391 cancel() 1392 } 1393 }(ctx.Done(), cn.CloseNotify()) 1394 } 1395 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1396 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1397 if err != nil { 1398 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1399 return 1400 } 1401 resp, md, err := request_Maintenance_Defragment_0(rctx, inboundMarshaler, client, req, pathParams) 1402 ctx = runtime.NewServerMetadataContext(ctx, md) 1403 if err != nil { 1404 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1405 return 1406 } 1407 1408 forward_Maintenance_Defragment_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1409 1410 }) 1411 1412 mux.Handle("POST", pattern_Maintenance_Hash_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1413 ctx, cancel := context.WithCancel(req.Context()) 1414 defer cancel() 1415 if cn, ok := w.(http.CloseNotifier); ok { 1416 go func(done <-chan struct{}, closed <-chan bool) { 1417 select { 1418 case <-done: 1419 case <-closed: 1420 cancel() 1421 } 1422 }(ctx.Done(), cn.CloseNotify()) 1423 } 1424 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1425 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1426 if err != nil { 1427 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1428 return 1429 } 1430 resp, md, err := request_Maintenance_Hash_0(rctx, inboundMarshaler, client, req, pathParams) 1431 ctx = runtime.NewServerMetadataContext(ctx, md) 1432 if err != nil { 1433 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1434 return 1435 } 1436 1437 forward_Maintenance_Hash_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1438 1439 }) 1440 1441 mux.Handle("POST", pattern_Maintenance_HashKV_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1442 ctx, cancel := context.WithCancel(req.Context()) 1443 defer cancel() 1444 if cn, ok := w.(http.CloseNotifier); ok { 1445 go func(done <-chan struct{}, closed <-chan bool) { 1446 select { 1447 case <-done: 1448 case <-closed: 1449 cancel() 1450 } 1451 }(ctx.Done(), cn.CloseNotify()) 1452 } 1453 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1454 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1455 if err != nil { 1456 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1457 return 1458 } 1459 resp, md, err := request_Maintenance_HashKV_0(rctx, inboundMarshaler, client, req, pathParams) 1460 ctx = runtime.NewServerMetadataContext(ctx, md) 1461 if err != nil { 1462 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1463 return 1464 } 1465 1466 forward_Maintenance_HashKV_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1467 1468 }) 1469 1470 mux.Handle("POST", pattern_Maintenance_Snapshot_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1471 ctx, cancel := context.WithCancel(req.Context()) 1472 defer cancel() 1473 if cn, ok := w.(http.CloseNotifier); ok { 1474 go func(done <-chan struct{}, closed <-chan bool) { 1475 select { 1476 case <-done: 1477 case <-closed: 1478 cancel() 1479 } 1480 }(ctx.Done(), cn.CloseNotify()) 1481 } 1482 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1483 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1484 if err != nil { 1485 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1486 return 1487 } 1488 resp, md, err := request_Maintenance_Snapshot_0(rctx, inboundMarshaler, client, req, pathParams) 1489 ctx = runtime.NewServerMetadataContext(ctx, md) 1490 if err != nil { 1491 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1492 return 1493 } 1494 1495 forward_Maintenance_Snapshot_0(ctx, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...) 1496 1497 }) 1498 1499 mux.Handle("POST", pattern_Maintenance_MoveLeader_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1500 ctx, cancel := context.WithCancel(req.Context()) 1501 defer cancel() 1502 if cn, ok := w.(http.CloseNotifier); ok { 1503 go func(done <-chan struct{}, closed <-chan bool) { 1504 select { 1505 case <-done: 1506 case <-closed: 1507 cancel() 1508 } 1509 }(ctx.Done(), cn.CloseNotify()) 1510 } 1511 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1512 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1513 if err != nil { 1514 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1515 return 1516 } 1517 resp, md, err := request_Maintenance_MoveLeader_0(rctx, inboundMarshaler, client, req, pathParams) 1518 ctx = runtime.NewServerMetadataContext(ctx, md) 1519 if err != nil { 1520 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1521 return 1522 } 1523 1524 forward_Maintenance_MoveLeader_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1525 1526 }) 1527 1528 return nil 1529 } 1530 1531 var ( 1532 pattern_Maintenance_Alarm_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "alarm"}, "")) 1533 1534 pattern_Maintenance_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "status"}, "")) 1535 1536 pattern_Maintenance_Defragment_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "defragment"}, "")) 1537 1538 pattern_Maintenance_Hash_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, "")) 1539 1540 pattern_Maintenance_HashKV_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "hash"}, "")) 1541 1542 pattern_Maintenance_Snapshot_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "snapshot"}, "")) 1543 1544 pattern_Maintenance_MoveLeader_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "maintenance", "transfer-leadership"}, "")) 1545 ) 1546 1547 var ( 1548 forward_Maintenance_Alarm_0 = runtime.ForwardResponseMessage 1549 1550 forward_Maintenance_Status_0 = runtime.ForwardResponseMessage 1551 1552 forward_Maintenance_Defragment_0 = runtime.ForwardResponseMessage 1553 1554 forward_Maintenance_Hash_0 = runtime.ForwardResponseMessage 1555 1556 forward_Maintenance_HashKV_0 = runtime.ForwardResponseMessage 1557 1558 forward_Maintenance_Snapshot_0 = runtime.ForwardResponseStream 1559 1560 forward_Maintenance_MoveLeader_0 = runtime.ForwardResponseMessage 1561 ) 1562 1563 // RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but 1564 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 1565 func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 1566 conn, err := grpc.Dial(endpoint, opts...) 1567 if err != nil { 1568 return err 1569 } 1570 defer func() { 1571 if err != nil { 1572 if cerr := conn.Close(); cerr != nil { 1573 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1574 } 1575 return 1576 } 1577 go func() { 1578 <-ctx.Done() 1579 if cerr := conn.Close(); cerr != nil { 1580 grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr) 1581 } 1582 }() 1583 }() 1584 1585 return RegisterAuthHandler(ctx, mux, conn) 1586 } 1587 1588 // RegisterAuthHandler registers the http handlers for service Auth to "mux". 1589 // The handlers forward requests to the grpc endpoint over "conn". 1590 func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 1591 return RegisterAuthHandlerClient(ctx, mux, etcdserverpb.NewAuthClient(conn)) 1592 } 1593 1594 // RegisterAuthHandler registers the http handlers for service Auth to "mux". 1595 // The handlers forward requests to the grpc endpoint over the given implementation of "AuthClient". 1596 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthClient" 1597 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 1598 // "AuthClient" to call the correct interceptors. 1599 func RegisterAuthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client etcdserverpb.AuthClient) error { 1600 1601 mux.Handle("POST", pattern_Auth_AuthEnable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1602 ctx, cancel := context.WithCancel(req.Context()) 1603 defer cancel() 1604 if cn, ok := w.(http.CloseNotifier); ok { 1605 go func(done <-chan struct{}, closed <-chan bool) { 1606 select { 1607 case <-done: 1608 case <-closed: 1609 cancel() 1610 } 1611 }(ctx.Done(), cn.CloseNotify()) 1612 } 1613 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1614 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1615 if err != nil { 1616 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1617 return 1618 } 1619 resp, md, err := request_Auth_AuthEnable_0(rctx, inboundMarshaler, client, req, pathParams) 1620 ctx = runtime.NewServerMetadataContext(ctx, md) 1621 if err != nil { 1622 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1623 return 1624 } 1625 1626 forward_Auth_AuthEnable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1627 1628 }) 1629 1630 mux.Handle("POST", pattern_Auth_AuthDisable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1631 ctx, cancel := context.WithCancel(req.Context()) 1632 defer cancel() 1633 if cn, ok := w.(http.CloseNotifier); ok { 1634 go func(done <-chan struct{}, closed <-chan bool) { 1635 select { 1636 case <-done: 1637 case <-closed: 1638 cancel() 1639 } 1640 }(ctx.Done(), cn.CloseNotify()) 1641 } 1642 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1643 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1644 if err != nil { 1645 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1646 return 1647 } 1648 resp, md, err := request_Auth_AuthDisable_0(rctx, inboundMarshaler, client, req, pathParams) 1649 ctx = runtime.NewServerMetadataContext(ctx, md) 1650 if err != nil { 1651 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1652 return 1653 } 1654 1655 forward_Auth_AuthDisable_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1656 1657 }) 1658 1659 mux.Handle("POST", pattern_Auth_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1660 ctx, cancel := context.WithCancel(req.Context()) 1661 defer cancel() 1662 if cn, ok := w.(http.CloseNotifier); ok { 1663 go func(done <-chan struct{}, closed <-chan bool) { 1664 select { 1665 case <-done: 1666 case <-closed: 1667 cancel() 1668 } 1669 }(ctx.Done(), cn.CloseNotify()) 1670 } 1671 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1672 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1673 if err != nil { 1674 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1675 return 1676 } 1677 resp, md, err := request_Auth_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams) 1678 ctx = runtime.NewServerMetadataContext(ctx, md) 1679 if err != nil { 1680 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1681 return 1682 } 1683 1684 forward_Auth_Authenticate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1685 1686 }) 1687 1688 mux.Handle("POST", pattern_Auth_UserAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1689 ctx, cancel := context.WithCancel(req.Context()) 1690 defer cancel() 1691 if cn, ok := w.(http.CloseNotifier); ok { 1692 go func(done <-chan struct{}, closed <-chan bool) { 1693 select { 1694 case <-done: 1695 case <-closed: 1696 cancel() 1697 } 1698 }(ctx.Done(), cn.CloseNotify()) 1699 } 1700 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1701 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1702 if err != nil { 1703 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1704 return 1705 } 1706 resp, md, err := request_Auth_UserAdd_0(rctx, inboundMarshaler, client, req, pathParams) 1707 ctx = runtime.NewServerMetadataContext(ctx, md) 1708 if err != nil { 1709 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1710 return 1711 } 1712 1713 forward_Auth_UserAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1714 1715 }) 1716 1717 mux.Handle("POST", pattern_Auth_UserGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1718 ctx, cancel := context.WithCancel(req.Context()) 1719 defer cancel() 1720 if cn, ok := w.(http.CloseNotifier); ok { 1721 go func(done <-chan struct{}, closed <-chan bool) { 1722 select { 1723 case <-done: 1724 case <-closed: 1725 cancel() 1726 } 1727 }(ctx.Done(), cn.CloseNotify()) 1728 } 1729 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1730 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1731 if err != nil { 1732 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1733 return 1734 } 1735 resp, md, err := request_Auth_UserGet_0(rctx, inboundMarshaler, client, req, pathParams) 1736 ctx = runtime.NewServerMetadataContext(ctx, md) 1737 if err != nil { 1738 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1739 return 1740 } 1741 1742 forward_Auth_UserGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1743 1744 }) 1745 1746 mux.Handle("POST", pattern_Auth_UserList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1747 ctx, cancel := context.WithCancel(req.Context()) 1748 defer cancel() 1749 if cn, ok := w.(http.CloseNotifier); ok { 1750 go func(done <-chan struct{}, closed <-chan bool) { 1751 select { 1752 case <-done: 1753 case <-closed: 1754 cancel() 1755 } 1756 }(ctx.Done(), cn.CloseNotify()) 1757 } 1758 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1759 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1760 if err != nil { 1761 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1762 return 1763 } 1764 resp, md, err := request_Auth_UserList_0(rctx, inboundMarshaler, client, req, pathParams) 1765 ctx = runtime.NewServerMetadataContext(ctx, md) 1766 if err != nil { 1767 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1768 return 1769 } 1770 1771 forward_Auth_UserList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1772 1773 }) 1774 1775 mux.Handle("POST", pattern_Auth_UserDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1776 ctx, cancel := context.WithCancel(req.Context()) 1777 defer cancel() 1778 if cn, ok := w.(http.CloseNotifier); ok { 1779 go func(done <-chan struct{}, closed <-chan bool) { 1780 select { 1781 case <-done: 1782 case <-closed: 1783 cancel() 1784 } 1785 }(ctx.Done(), cn.CloseNotify()) 1786 } 1787 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1788 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1789 if err != nil { 1790 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1791 return 1792 } 1793 resp, md, err := request_Auth_UserDelete_0(rctx, inboundMarshaler, client, req, pathParams) 1794 ctx = runtime.NewServerMetadataContext(ctx, md) 1795 if err != nil { 1796 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1797 return 1798 } 1799 1800 forward_Auth_UserDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1801 1802 }) 1803 1804 mux.Handle("POST", pattern_Auth_UserChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1805 ctx, cancel := context.WithCancel(req.Context()) 1806 defer cancel() 1807 if cn, ok := w.(http.CloseNotifier); ok { 1808 go func(done <-chan struct{}, closed <-chan bool) { 1809 select { 1810 case <-done: 1811 case <-closed: 1812 cancel() 1813 } 1814 }(ctx.Done(), cn.CloseNotify()) 1815 } 1816 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1817 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1818 if err != nil { 1819 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1820 return 1821 } 1822 resp, md, err := request_Auth_UserChangePassword_0(rctx, inboundMarshaler, client, req, pathParams) 1823 ctx = runtime.NewServerMetadataContext(ctx, md) 1824 if err != nil { 1825 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1826 return 1827 } 1828 1829 forward_Auth_UserChangePassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1830 1831 }) 1832 1833 mux.Handle("POST", pattern_Auth_UserGrantRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1834 ctx, cancel := context.WithCancel(req.Context()) 1835 defer cancel() 1836 if cn, ok := w.(http.CloseNotifier); ok { 1837 go func(done <-chan struct{}, closed <-chan bool) { 1838 select { 1839 case <-done: 1840 case <-closed: 1841 cancel() 1842 } 1843 }(ctx.Done(), cn.CloseNotify()) 1844 } 1845 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1846 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1847 if err != nil { 1848 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1849 return 1850 } 1851 resp, md, err := request_Auth_UserGrantRole_0(rctx, inboundMarshaler, client, req, pathParams) 1852 ctx = runtime.NewServerMetadataContext(ctx, md) 1853 if err != nil { 1854 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1855 return 1856 } 1857 1858 forward_Auth_UserGrantRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1859 1860 }) 1861 1862 mux.Handle("POST", pattern_Auth_UserRevokeRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1863 ctx, cancel := context.WithCancel(req.Context()) 1864 defer cancel() 1865 if cn, ok := w.(http.CloseNotifier); ok { 1866 go func(done <-chan struct{}, closed <-chan bool) { 1867 select { 1868 case <-done: 1869 case <-closed: 1870 cancel() 1871 } 1872 }(ctx.Done(), cn.CloseNotify()) 1873 } 1874 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1875 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1876 if err != nil { 1877 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1878 return 1879 } 1880 resp, md, err := request_Auth_UserRevokeRole_0(rctx, inboundMarshaler, client, req, pathParams) 1881 ctx = runtime.NewServerMetadataContext(ctx, md) 1882 if err != nil { 1883 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1884 return 1885 } 1886 1887 forward_Auth_UserRevokeRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1888 1889 }) 1890 1891 mux.Handle("POST", pattern_Auth_RoleAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1892 ctx, cancel := context.WithCancel(req.Context()) 1893 defer cancel() 1894 if cn, ok := w.(http.CloseNotifier); ok { 1895 go func(done <-chan struct{}, closed <-chan bool) { 1896 select { 1897 case <-done: 1898 case <-closed: 1899 cancel() 1900 } 1901 }(ctx.Done(), cn.CloseNotify()) 1902 } 1903 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1904 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1905 if err != nil { 1906 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1907 return 1908 } 1909 resp, md, err := request_Auth_RoleAdd_0(rctx, inboundMarshaler, client, req, pathParams) 1910 ctx = runtime.NewServerMetadataContext(ctx, md) 1911 if err != nil { 1912 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1913 return 1914 } 1915 1916 forward_Auth_RoleAdd_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1917 1918 }) 1919 1920 mux.Handle("POST", pattern_Auth_RoleGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1921 ctx, cancel := context.WithCancel(req.Context()) 1922 defer cancel() 1923 if cn, ok := w.(http.CloseNotifier); ok { 1924 go func(done <-chan struct{}, closed <-chan bool) { 1925 select { 1926 case <-done: 1927 case <-closed: 1928 cancel() 1929 } 1930 }(ctx.Done(), cn.CloseNotify()) 1931 } 1932 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1933 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1934 if err != nil { 1935 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1936 return 1937 } 1938 resp, md, err := request_Auth_RoleGet_0(rctx, inboundMarshaler, client, req, pathParams) 1939 ctx = runtime.NewServerMetadataContext(ctx, md) 1940 if err != nil { 1941 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1942 return 1943 } 1944 1945 forward_Auth_RoleGet_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1946 1947 }) 1948 1949 mux.Handle("POST", pattern_Auth_RoleList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1950 ctx, cancel := context.WithCancel(req.Context()) 1951 defer cancel() 1952 if cn, ok := w.(http.CloseNotifier); ok { 1953 go func(done <-chan struct{}, closed <-chan bool) { 1954 select { 1955 case <-done: 1956 case <-closed: 1957 cancel() 1958 } 1959 }(ctx.Done(), cn.CloseNotify()) 1960 } 1961 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1962 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1963 if err != nil { 1964 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1965 return 1966 } 1967 resp, md, err := request_Auth_RoleList_0(rctx, inboundMarshaler, client, req, pathParams) 1968 ctx = runtime.NewServerMetadataContext(ctx, md) 1969 if err != nil { 1970 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1971 return 1972 } 1973 1974 forward_Auth_RoleList_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 1975 1976 }) 1977 1978 mux.Handle("POST", pattern_Auth_RoleDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 1979 ctx, cancel := context.WithCancel(req.Context()) 1980 defer cancel() 1981 if cn, ok := w.(http.CloseNotifier); ok { 1982 go func(done <-chan struct{}, closed <-chan bool) { 1983 select { 1984 case <-done: 1985 case <-closed: 1986 cancel() 1987 } 1988 }(ctx.Done(), cn.CloseNotify()) 1989 } 1990 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 1991 rctx, err := runtime.AnnotateContext(ctx, mux, req) 1992 if err != nil { 1993 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 1994 return 1995 } 1996 resp, md, err := request_Auth_RoleDelete_0(rctx, inboundMarshaler, client, req, pathParams) 1997 ctx = runtime.NewServerMetadataContext(ctx, md) 1998 if err != nil { 1999 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2000 return 2001 } 2002 2003 forward_Auth_RoleDelete_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2004 2005 }) 2006 2007 mux.Handle("POST", pattern_Auth_RoleGrantPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2008 ctx, cancel := context.WithCancel(req.Context()) 2009 defer cancel() 2010 if cn, ok := w.(http.CloseNotifier); ok { 2011 go func(done <-chan struct{}, closed <-chan bool) { 2012 select { 2013 case <-done: 2014 case <-closed: 2015 cancel() 2016 } 2017 }(ctx.Done(), cn.CloseNotify()) 2018 } 2019 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2020 rctx, err := runtime.AnnotateContext(ctx, mux, req) 2021 if err != nil { 2022 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2023 return 2024 } 2025 resp, md, err := request_Auth_RoleGrantPermission_0(rctx, inboundMarshaler, client, req, pathParams) 2026 ctx = runtime.NewServerMetadataContext(ctx, md) 2027 if err != nil { 2028 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2029 return 2030 } 2031 2032 forward_Auth_RoleGrantPermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2033 2034 }) 2035 2036 mux.Handle("POST", pattern_Auth_RoleRevokePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 2037 ctx, cancel := context.WithCancel(req.Context()) 2038 defer cancel() 2039 if cn, ok := w.(http.CloseNotifier); ok { 2040 go func(done <-chan struct{}, closed <-chan bool) { 2041 select { 2042 case <-done: 2043 case <-closed: 2044 cancel() 2045 } 2046 }(ctx.Done(), cn.CloseNotify()) 2047 } 2048 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 2049 rctx, err := runtime.AnnotateContext(ctx, mux, req) 2050 if err != nil { 2051 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2052 return 2053 } 2054 resp, md, err := request_Auth_RoleRevokePermission_0(rctx, inboundMarshaler, client, req, pathParams) 2055 ctx = runtime.NewServerMetadataContext(ctx, md) 2056 if err != nil { 2057 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 2058 return 2059 } 2060 2061 forward_Auth_RoleRevokePermission_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 2062 2063 }) 2064 2065 return nil 2066 } 2067 2068 var ( 2069 pattern_Auth_AuthEnable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "enable"}, "")) 2070 2071 pattern_Auth_AuthDisable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "disable"}, "")) 2072 2073 pattern_Auth_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3beta", "auth", "authenticate"}, "")) 2074 2075 pattern_Auth_UserAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "add"}, "")) 2076 2077 pattern_Auth_UserGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "get"}, "")) 2078 2079 pattern_Auth_UserList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "list"}, "")) 2080 2081 pattern_Auth_UserDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "delete"}, "")) 2082 2083 pattern_Auth_UserChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "changepw"}, "")) 2084 2085 pattern_Auth_UserGrantRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "grant"}, "")) 2086 2087 pattern_Auth_UserRevokeRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "user", "revoke"}, "")) 2088 2089 pattern_Auth_RoleAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "add"}, "")) 2090 2091 pattern_Auth_RoleGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "get"}, "")) 2092 2093 pattern_Auth_RoleList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "list"}, "")) 2094 2095 pattern_Auth_RoleDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "delete"}, "")) 2096 2097 pattern_Auth_RoleGrantPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "grant"}, "")) 2098 2099 pattern_Auth_RoleRevokePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3beta", "auth", "role", "revoke"}, "")) 2100 ) 2101 2102 var ( 2103 forward_Auth_AuthEnable_0 = runtime.ForwardResponseMessage 2104 2105 forward_Auth_AuthDisable_0 = runtime.ForwardResponseMessage 2106 2107 forward_Auth_Authenticate_0 = runtime.ForwardResponseMessage 2108 2109 forward_Auth_UserAdd_0 = runtime.ForwardResponseMessage 2110 2111 forward_Auth_UserGet_0 = runtime.ForwardResponseMessage 2112 2113 forward_Auth_UserList_0 = runtime.ForwardResponseMessage 2114 2115 forward_Auth_UserDelete_0 = runtime.ForwardResponseMessage 2116 2117 forward_Auth_UserChangePassword_0 = runtime.ForwardResponseMessage 2118 2119 forward_Auth_UserGrantRole_0 = runtime.ForwardResponseMessage 2120 2121 forward_Auth_UserRevokeRole_0 = runtime.ForwardResponseMessage 2122 2123 forward_Auth_RoleAdd_0 = runtime.ForwardResponseMessage 2124 2125 forward_Auth_RoleGet_0 = runtime.ForwardResponseMessage 2126 2127 forward_Auth_RoleList_0 = runtime.ForwardResponseMessage 2128 2129 forward_Auth_RoleDelete_0 = runtime.ForwardResponseMessage 2130 2131 forward_Auth_RoleGrantPermission_0 = runtime.ForwardResponseMessage 2132 2133 forward_Auth_RoleRevokePermission_0 = runtime.ForwardResponseMessage 2134 )