mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00

This commit expands RPCs for getting user and role and support list up all users and roles. etcdctl v3 is now support getting all users and roles with the newly added option --all e.g. etcdctl user get --all
1810 lines
64 KiB
Go
1810 lines
64 KiB
Go
// Code generated by protoc-gen-grpc-gateway
|
|
// source: etcdserver/etcdserverpb/rpc.proto
|
|
// DO NOT EDIT!
|
|
|
|
/*
|
|
Package etcdserverpb is a reverse proxy.
|
|
|
|
It translates gRPC into RESTful JSON APIs.
|
|
*/
|
|
package etcdserverpb
|
|
|
|
import (
|
|
"io"
|
|
"net/http"
|
|
|
|
"github.com/gengo/grpc-gateway/runtime"
|
|
"github.com/gengo/grpc-gateway/utilities"
|
|
"github.com/golang/protobuf/proto"
|
|
"golang.org/x/net/context"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/grpclog"
|
|
)
|
|
|
|
var _ codes.Code
|
|
var _ io.Reader
|
|
var _ = runtime.String
|
|
var _ = utilities.NewDoubleArray
|
|
|
|
func request_KV_Range_0(ctx context.Context, marshaler runtime.Marshaler, client KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq RangeRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Range(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_KV_Put_0(ctx context.Context, marshaler runtime.Marshaler, client KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq PutRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Put(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_KV_Txn_0(ctx context.Context, marshaler runtime.Marshaler, client KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq TxnRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Txn(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_KV_Compact_0(ctx context.Context, marshaler runtime.Marshaler, client KVClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq CompactionRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Compact(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
|
|
var metadata runtime.ServerMetadata
|
|
stream, err := client.Watch(ctx)
|
|
if err != nil {
|
|
grpclog.Printf("Failed to start streaming: %v", err)
|
|
return nil, metadata, err
|
|
}
|
|
dec := marshaler.NewDecoder(req.Body)
|
|
handleSend := func() error {
|
|
var protoReq WatchRequest
|
|
err = dec.Decode(&protoReq)
|
|
if err != nil {
|
|
grpclog.Printf("Failed to decode request: %v", err)
|
|
return err
|
|
}
|
|
if err = stream.Send(&protoReq); err != nil {
|
|
grpclog.Printf("Failed to send request: %v", err)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
if err := handleSend(); err != nil {
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Printf("Failed to terminate client stream: %v", err)
|
|
}
|
|
return nil, metadata, err
|
|
}
|
|
go func() {
|
|
for {
|
|
if err := handleSend(); err != nil {
|
|
break
|
|
}
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Printf("Failed to terminate client stream: %v", err)
|
|
}
|
|
}()
|
|
header, err := stream.Header()
|
|
if err != nil {
|
|
grpclog.Printf("Failed to get header from client: %v", err)
|
|
return nil, metadata, err
|
|
}
|
|
metadata.HeaderMD = header
|
|
return stream, metadata, nil
|
|
}
|
|
|
|
func request_Lease_LeaseGrant_0(ctx context.Context, marshaler runtime.Marshaler, client LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq LeaseGrantRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.LeaseGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Lease_LeaseRevoke_0(ctx context.Context, marshaler runtime.Marshaler, client LeaseClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq LeaseRevokeRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.LeaseRevoke(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Lease_LeaseKeepAlive_0(ctx context.Context, marshaler runtime.Marshaler, client LeaseClient, req *http.Request, pathParams map[string]string) (Lease_LeaseKeepAliveClient, runtime.ServerMetadata, error) {
|
|
var metadata runtime.ServerMetadata
|
|
stream, err := client.LeaseKeepAlive(ctx)
|
|
if err != nil {
|
|
grpclog.Printf("Failed to start streaming: %v", err)
|
|
return nil, metadata, err
|
|
}
|
|
dec := marshaler.NewDecoder(req.Body)
|
|
handleSend := func() error {
|
|
var protoReq LeaseKeepAliveRequest
|
|
err = dec.Decode(&protoReq)
|
|
if err != nil {
|
|
grpclog.Printf("Failed to decode request: %v", err)
|
|
return err
|
|
}
|
|
if err = stream.Send(&protoReq); err != nil {
|
|
grpclog.Printf("Failed to send request: %v", err)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
if err := handleSend(); err != nil {
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Printf("Failed to terminate client stream: %v", err)
|
|
}
|
|
return nil, metadata, err
|
|
}
|
|
go func() {
|
|
for {
|
|
if err := handleSend(); err != nil {
|
|
break
|
|
}
|
|
}
|
|
if err := stream.CloseSend(); err != nil {
|
|
grpclog.Printf("Failed to terminate client stream: %v", err)
|
|
}
|
|
}()
|
|
header, err := stream.Header()
|
|
if err != nil {
|
|
grpclog.Printf("Failed to get header from client: %v", err)
|
|
return nil, metadata, err
|
|
}
|
|
metadata.HeaderMD = header
|
|
return stream, metadata, nil
|
|
}
|
|
|
|
func request_Cluster_MemberAdd_0(ctx context.Context, marshaler runtime.Marshaler, client ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq MemberAddRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.MemberAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Cluster_MemberRemove_0(ctx context.Context, marshaler runtime.Marshaler, client ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq MemberRemoveRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.MemberRemove(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Cluster_MemberUpdate_0(ctx context.Context, marshaler runtime.Marshaler, client ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq MemberUpdateRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.MemberUpdate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Cluster_MemberList_0(ctx context.Context, marshaler runtime.Marshaler, client ClusterClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq MemberListRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.MemberList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Maintenance_Alarm_0(ctx context.Context, marshaler runtime.Marshaler, client MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AlarmRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Alarm(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Maintenance_Status_0(ctx context.Context, marshaler runtime.Marshaler, client MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq StatusRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Maintenance_Defragment_0(ctx context.Context, marshaler runtime.Marshaler, client MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq DefragmentRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Defragment(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Maintenance_Hash_0(ctx context.Context, marshaler runtime.Marshaler, client MaintenanceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq HashRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Hash(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Maintenance_Snapshot_0(ctx context.Context, marshaler runtime.Marshaler, client MaintenanceClient, req *http.Request, pathParams map[string]string) (Maintenance_SnapshotClient, runtime.ServerMetadata, error) {
|
|
var protoReq SnapshotRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
stream, err := client.Snapshot(ctx, &protoReq)
|
|
if err != nil {
|
|
return nil, metadata, err
|
|
}
|
|
header, err := stream.Header()
|
|
if err != nil {
|
|
return nil, metadata, err
|
|
}
|
|
metadata.HeaderMD = header
|
|
return stream, metadata, nil
|
|
|
|
}
|
|
|
|
func request_Auth_AuthEnable_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthEnableRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.AuthEnable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_AuthDisable_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthDisableRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.AuthDisable(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthenticateRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserAdd_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserAddRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserGet_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserGetRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserList_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserListRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserDelete_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserDeleteRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserChangePassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserChangePasswordRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserChangePassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserGrantRole_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserGrantRoleRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserGrantRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_UserRevokeRole_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthUserRevokeRoleRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.UserRevokeRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleAdd_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleAddRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleAdd(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleGet_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleGetRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleGet(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleList_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleListRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleList(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleDelete_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleDeleteRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleDelete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleGrantPermission_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleGrantPermissionRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleGrantPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
func request_Auth_RoleRevokePermission_0(ctx context.Context, marshaler runtime.Marshaler, client AuthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
|
|
var protoReq AuthRoleRevokePermissionRequest
|
|
var metadata runtime.ServerMetadata
|
|
|
|
if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
|
|
return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
|
|
}
|
|
|
|
msg, err := client.RoleRevokePermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
|
|
return msg, metadata, err
|
|
|
|
}
|
|
|
|
// RegisterKVHandlerFromEndpoint is same as RegisterKVHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterKVHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterKVHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterKVHandler registers the http handlers for service KV to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterKVHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewKVClient(conn)
|
|
|
|
mux.Handle("POST", pattern_KV_Range_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_KV_Range_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_KV_Range_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_KV_Put_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_KV_Put_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_KV_Put_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_KV_Txn_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_KV_Txn_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_KV_Txn_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_KV_Compact_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_KV_Compact_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_KV_Compact_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_KV_Range_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "kv", "range"}, ""))
|
|
|
|
pattern_KV_Put_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "kv", "put"}, ""))
|
|
|
|
pattern_KV_Txn_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "kv", "txn"}, ""))
|
|
|
|
pattern_KV_Compact_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "kv", "compaction"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_KV_Range_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_KV_Put_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_KV_Txn_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_KV_Compact_0 = runtime.ForwardResponseMessage
|
|
)
|
|
|
|
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterWatchHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewWatchClient(conn)
|
|
|
|
mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Watch_Watch_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Watch_Watch_0(ctx, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v3alpha", "watch"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_Watch_Watch_0 = runtime.ForwardResponseStream
|
|
)
|
|
|
|
// RegisterLeaseHandlerFromEndpoint is same as RegisterLeaseHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterLeaseHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterLeaseHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterLeaseHandler registers the http handlers for service Lease to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterLeaseHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewLeaseClient(conn)
|
|
|
|
mux.Handle("POST", pattern_Lease_LeaseGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Lease_LeaseGrant_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Lease_LeaseGrant_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Lease_LeaseRevoke_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Lease_LeaseRevoke_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Lease_LeaseRevoke_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Lease_LeaseKeepAlive_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Lease_LeaseKeepAlive_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Lease_LeaseKeepAlive_0(ctx, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_Lease_LeaseGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "lease", "grant"}, ""))
|
|
|
|
pattern_Lease_LeaseRevoke_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "kv", "lease", "revoke"}, ""))
|
|
|
|
pattern_Lease_LeaseKeepAlive_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "lease", "keepalive"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_Lease_LeaseGrant_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Lease_LeaseRevoke_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Lease_LeaseKeepAlive_0 = runtime.ForwardResponseStream
|
|
)
|
|
|
|
// RegisterClusterHandlerFromEndpoint is same as RegisterClusterHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterClusterHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterClusterHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterClusterHandler registers the http handlers for service Cluster to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterClusterHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewClusterClient(conn)
|
|
|
|
mux.Handle("POST", pattern_Cluster_MemberAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Cluster_MemberAdd_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Cluster_MemberAdd_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Cluster_MemberRemove_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Cluster_MemberRemove_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Cluster_MemberRemove_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Cluster_MemberUpdate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Cluster_MemberUpdate_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Cluster_MemberUpdate_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Cluster_MemberList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Cluster_MemberList_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Cluster_MemberList_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_Cluster_MemberAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "cluster", "member", "add"}, ""))
|
|
|
|
pattern_Cluster_MemberRemove_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "cluster", "member", "remove"}, ""))
|
|
|
|
pattern_Cluster_MemberUpdate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "cluster", "member", "update"}, ""))
|
|
|
|
pattern_Cluster_MemberList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "cluster", "member", "list"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_Cluster_MemberAdd_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Cluster_MemberRemove_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Cluster_MemberUpdate_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Cluster_MemberList_0 = runtime.ForwardResponseMessage
|
|
)
|
|
|
|
// RegisterMaintenanceHandlerFromEndpoint is same as RegisterMaintenanceHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterMaintenanceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterMaintenanceHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterMaintenanceHandler registers the http handlers for service Maintenance to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterMaintenanceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewMaintenanceClient(conn)
|
|
|
|
mux.Handle("POST", pattern_Maintenance_Alarm_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Maintenance_Alarm_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Maintenance_Alarm_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Maintenance_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Maintenance_Status_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Maintenance_Status_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Maintenance_Defragment_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Maintenance_Defragment_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Maintenance_Defragment_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Maintenance_Hash_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Maintenance_Hash_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Maintenance_Hash_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Maintenance_Snapshot_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Maintenance_Snapshot_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Maintenance_Snapshot_0(ctx, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_Maintenance_Alarm_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "maintenance", "alarm"}, ""))
|
|
|
|
pattern_Maintenance_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "maintenance", "status"}, ""))
|
|
|
|
pattern_Maintenance_Defragment_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "maintenance", "defragment"}, ""))
|
|
|
|
pattern_Maintenance_Hash_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "maintenance", "hash"}, ""))
|
|
|
|
pattern_Maintenance_Snapshot_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "maintenance", "snapshot"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_Maintenance_Alarm_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Maintenance_Status_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Maintenance_Defragment_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Maintenance_Hash_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Maintenance_Snapshot_0 = runtime.ForwardResponseStream
|
|
)
|
|
|
|
// RegisterAuthHandlerFromEndpoint is same as RegisterAuthHandler but
|
|
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
|
|
func RegisterAuthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
return
|
|
}
|
|
go func() {
|
|
<-ctx.Done()
|
|
if cerr := conn.Close(); cerr != nil {
|
|
grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
|
|
}
|
|
}()
|
|
}()
|
|
|
|
return RegisterAuthHandler(ctx, mux, conn)
|
|
}
|
|
|
|
// RegisterAuthHandler registers the http handlers for service Auth to "mux".
|
|
// The handlers forward requests to the grpc endpoint over "conn".
|
|
func RegisterAuthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
|
|
client := NewAuthClient(conn)
|
|
|
|
mux.Handle("POST", pattern_Auth_AuthEnable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_AuthEnable_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_AuthEnable_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_AuthDisable_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_AuthDisable_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_AuthDisable_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_Authenticate_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserAdd_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserAdd_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserGet_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserGet_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserList_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserList_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserDelete_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserDelete_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserChangePassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserChangePassword_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserChangePassword_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserGrantRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserGrantRole_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserGrantRole_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_UserRevokeRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_UserRevokeRole_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_UserRevokeRole_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleAdd_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleAdd_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleAdd_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleGet_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleGet_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleGet_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleList_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleList_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleList_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleDelete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleDelete_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleDelete_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleGrantPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleGrantPermission_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleGrantPermission_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
mux.Handle("POST", pattern_Auth_RoleRevokePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
if cn, ok := w.(http.CloseNotifier); ok {
|
|
go func(done <-chan struct{}, closed <-chan bool) {
|
|
select {
|
|
case <-done:
|
|
case <-closed:
|
|
cancel()
|
|
}
|
|
}(ctx.Done(), cn.CloseNotify())
|
|
}
|
|
inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
|
|
rctx, err := runtime.AnnotateContext(ctx, req)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
}
|
|
resp, md, err := request_Auth_RoleRevokePermission_0(rctx, inboundMarshaler, client, req, pathParams)
|
|
ctx = runtime.NewServerMetadataContext(ctx, md)
|
|
if err != nil {
|
|
runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
|
|
return
|
|
}
|
|
|
|
forward_Auth_RoleRevokePermission_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
|
|
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
var (
|
|
pattern_Auth_AuthEnable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "auth", "enable"}, ""))
|
|
|
|
pattern_Auth_AuthDisable_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "auth", "disable"}, ""))
|
|
|
|
pattern_Auth_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "auth", "authenticate"}, ""))
|
|
|
|
pattern_Auth_UserAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "add"}, ""))
|
|
|
|
pattern_Auth_UserGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "get"}, ""))
|
|
|
|
pattern_Auth_UserList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "list"}, ""))
|
|
|
|
pattern_Auth_UserDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "delete"}, ""))
|
|
|
|
pattern_Auth_UserChangePassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "changepw"}, ""))
|
|
|
|
pattern_Auth_UserGrantRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "grant"}, ""))
|
|
|
|
pattern_Auth_UserRevokeRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "user", "revoke"}, ""))
|
|
|
|
pattern_Auth_RoleAdd_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "add"}, ""))
|
|
|
|
pattern_Auth_RoleGet_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "get"}, ""))
|
|
|
|
pattern_Auth_RoleList_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "list"}, ""))
|
|
|
|
pattern_Auth_RoleDelete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "delete"}, ""))
|
|
|
|
pattern_Auth_RoleGrantPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "grant"}, ""))
|
|
|
|
pattern_Auth_RoleRevokePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v3alpha", "auth", "role", "revoke"}, ""))
|
|
)
|
|
|
|
var (
|
|
forward_Auth_AuthEnable_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_AuthDisable_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_Authenticate_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserAdd_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserGet_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserList_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserDelete_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserChangePassword_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserGrantRole_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_UserRevokeRole_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleAdd_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleGet_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleList_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleDelete_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleGrantPermission_0 = runtime.ForwardResponseMessage
|
|
|
|
forward_Auth_RoleRevokePermission_0 = runtime.ForwardResponseMessage
|
|
)
|