Passed
Push — master ( bf001a...4b5e81 )
by Tolga
01:15 queued 15s
created

basev1.RegisterDataHandler   A

Complexity

Conditions 1

Size

Total Lines 2
Code Lines 2

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 1
eloc 2
nop 3
dl 0
loc 2
rs 10
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Health_Check_0(ctx context.Context, marshaler runtime.Marshaler, client HealthClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq HealthRequest
36
	var metadata runtime.ServerMetadata
37
38
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
39
	return msg, metadata, err
40
41
}
42
43
func local_request_Health_Check_0(ctx context.Context, marshaler runtime.Marshaler, server HealthServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
44
	var protoReq HealthRequest
45
	var metadata runtime.ServerMetadata
46
47
	msg, err := server.Check(ctx, &protoReq)
48
	return msg, metadata, err
49
50
}
51
52
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
53
	var protoReq PermissionCheckRequest
54
	var metadata runtime.ServerMetadata
55
56
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
57
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
58
	}
59
60
	var (
61
		val string
62
		ok  bool
63
		err error
64
		_   = err
65
	)
66
67
	val, ok = pathParams["tenant_id"]
68
	if !ok {
69
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
70
	}
71
72
	protoReq.TenantId, err = runtime.String(val)
73
	if err != nil {
74
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
75
	}
76
77
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
78
	return msg, metadata, err
79
80
}
81
82
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
83
	var protoReq PermissionCheckRequest
84
	var metadata runtime.ServerMetadata
85
86
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
87
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
88
	}
89
90
	var (
91
		val string
92
		ok  bool
93
		err error
94
		_   = err
95
	)
96
97
	val, ok = pathParams["tenant_id"]
98
	if !ok {
99
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
100
	}
101
102
	protoReq.TenantId, err = runtime.String(val)
103
	if err != nil {
104
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
105
	}
106
107
	msg, err := server.Check(ctx, &protoReq)
108
	return msg, metadata, err
109
110
}
111
112
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
113
	var protoReq PermissionExpandRequest
114
	var metadata runtime.ServerMetadata
115
116
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
117
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
118
	}
119
120
	var (
121
		val string
122
		ok  bool
123
		err error
124
		_   = err
125
	)
126
127
	val, ok = pathParams["tenant_id"]
128
	if !ok {
129
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
130
	}
131
132
	protoReq.TenantId, err = runtime.String(val)
133
	if err != nil {
134
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
135
	}
136
137
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
138
	return msg, metadata, err
139
140
}
141
142
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
143
	var protoReq PermissionExpandRequest
144
	var metadata runtime.ServerMetadata
145
146
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
147
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
148
	}
149
150
	var (
151
		val string
152
		ok  bool
153
		err error
154
		_   = err
155
	)
156
157
	val, ok = pathParams["tenant_id"]
158
	if !ok {
159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
160
	}
161
162
	protoReq.TenantId, err = runtime.String(val)
163
	if err != nil {
164
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
165
	}
166
167
	msg, err := server.Expand(ctx, &protoReq)
168
	return msg, metadata, err
169
170
}
171
172
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
173
	var protoReq PermissionLookupEntityRequest
174
	var metadata runtime.ServerMetadata
175
176
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
177
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
178
	}
179
180
	var (
181
		val string
182
		ok  bool
183
		err error
184
		_   = err
185
	)
186
187
	val, ok = pathParams["tenant_id"]
188
	if !ok {
189
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
190
	}
191
192
	protoReq.TenantId, err = runtime.String(val)
193
	if err != nil {
194
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
195
	}
196
197
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
198
	return msg, metadata, err
199
200
}
201
202
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
203
	var protoReq PermissionLookupEntityRequest
204
	var metadata runtime.ServerMetadata
205
206
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
207
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
208
	}
209
210
	var (
211
		val string
212
		ok  bool
213
		err error
214
		_   = err
215
	)
216
217
	val, ok = pathParams["tenant_id"]
218
	if !ok {
219
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
220
	}
221
222
	protoReq.TenantId, err = runtime.String(val)
223
	if err != nil {
224
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
225
	}
226
227
	msg, err := server.LookupEntity(ctx, &protoReq)
228
	return msg, metadata, err
229
230
}
231
232
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
233
	var protoReq PermissionLookupEntityRequest
234
	var metadata runtime.ServerMetadata
235
236
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
237
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
238
	}
239
240
	var (
241
		val string
242
		ok  bool
243
		err error
244
		_   = err
245
	)
246
247
	val, ok = pathParams["tenant_id"]
248
	if !ok {
249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
250
	}
251
252
	protoReq.TenantId, err = runtime.String(val)
253
	if err != nil {
254
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
255
	}
256
257
	stream, err := client.LookupEntityStream(ctx, &protoReq)
258
	if err != nil {
259
		return nil, metadata, err
260
	}
261
	header, err := stream.Header()
262
	if err != nil {
263
		return nil, metadata, err
264
	}
265
	metadata.HeaderMD = header
266
	return stream, metadata, nil
267
268
}
269
270
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
271
	var protoReq PermissionLookupSubjectRequest
272
	var metadata runtime.ServerMetadata
273
274
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
275
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
276
	}
277
278
	var (
279
		val string
280
		ok  bool
281
		err error
282
		_   = err
283
	)
284
285
	val, ok = pathParams["tenant_id"]
286
	if !ok {
287
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
288
	}
289
290
	protoReq.TenantId, err = runtime.String(val)
291
	if err != nil {
292
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
293
	}
294
295
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
296
	return msg, metadata, err
297
298
}
299
300
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
301
	var protoReq PermissionLookupSubjectRequest
302
	var metadata runtime.ServerMetadata
303
304
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
305
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
306
	}
307
308
	var (
309
		val string
310
		ok  bool
311
		err error
312
		_   = err
313
	)
314
315
	val, ok = pathParams["tenant_id"]
316
	if !ok {
317
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
318
	}
319
320
	protoReq.TenantId, err = runtime.String(val)
321
	if err != nil {
322
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
323
	}
324
325
	msg, err := server.LookupSubject(ctx, &protoReq)
326
	return msg, metadata, err
327
328
}
329
330
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
331
	var protoReq PermissionSubjectPermissionRequest
332
	var metadata runtime.ServerMetadata
333
334
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
335
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
336
	}
337
338
	var (
339
		val string
340
		ok  bool
341
		err error
342
		_   = err
343
	)
344
345
	val, ok = pathParams["tenant_id"]
346
	if !ok {
347
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
348
	}
349
350
	protoReq.TenantId, err = runtime.String(val)
351
	if err != nil {
352
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
353
	}
354
355
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
356
	return msg, metadata, err
357
358
}
359
360
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
361
	var protoReq PermissionSubjectPermissionRequest
362
	var metadata runtime.ServerMetadata
363
364
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
365
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
366
	}
367
368
	var (
369
		val string
370
		ok  bool
371
		err error
372
		_   = err
373
	)
374
375
	val, ok = pathParams["tenant_id"]
376
	if !ok {
377
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
378
	}
379
380
	protoReq.TenantId, err = runtime.String(val)
381
	if err != nil {
382
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
383
	}
384
385
	msg, err := server.SubjectPermission(ctx, &protoReq)
386
	return msg, metadata, err
387
388
}
389
390
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
391
	var protoReq WatchRequest
392
	var metadata runtime.ServerMetadata
393
394
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
395
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
396
	}
397
398
	var (
399
		val string
400
		ok  bool
401
		err error
402
		_   = err
403
	)
404
405
	val, ok = pathParams["tenant_id"]
406
	if !ok {
407
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
408
	}
409
410
	protoReq.TenantId, err = runtime.String(val)
411
	if err != nil {
412
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
413
	}
414
415
	stream, err := client.Watch(ctx, &protoReq)
416
	if err != nil {
417
		return nil, metadata, err
418
	}
419
	header, err := stream.Header()
420
	if err != nil {
421
		return nil, metadata, err
422
	}
423
	metadata.HeaderMD = header
424
	return stream, metadata, nil
425
426
}
427
428
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
429
	var protoReq SchemaWriteRequest
430
	var metadata runtime.ServerMetadata
431
432
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
433
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
434
	}
435
436
	var (
437
		val string
438
		ok  bool
439
		err error
440
		_   = err
441
	)
442
443
	val, ok = pathParams["tenant_id"]
444
	if !ok {
445
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
446
	}
447
448
	protoReq.TenantId, err = runtime.String(val)
449
	if err != nil {
450
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
451
	}
452
453
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
454
	return msg, metadata, err
455
456
}
457
458
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
459
	var protoReq SchemaWriteRequest
460
	var metadata runtime.ServerMetadata
461
462
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
463
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
464
	}
465
466
	var (
467
		val string
468
		ok  bool
469
		err error
470
		_   = err
471
	)
472
473
	val, ok = pathParams["tenant_id"]
474
	if !ok {
475
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
476
	}
477
478
	protoReq.TenantId, err = runtime.String(val)
479
	if err != nil {
480
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
481
	}
482
483
	msg, err := server.Write(ctx, &protoReq)
484
	return msg, metadata, err
485
486
}
487
488
func request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
489
	var protoReq SchemaPartialWriteRequest
490
	var metadata runtime.ServerMetadata
491
492
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
493
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
494
	}
495
496
	var (
497
		val string
498
		ok  bool
499
		err error
500
		_   = err
501
	)
502
503
	val, ok = pathParams["tenant_id"]
504
	if !ok {
505
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
506
	}
507
508
	protoReq.TenantId, err = runtime.String(val)
509
	if err != nil {
510
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
511
	}
512
513
	msg, err := client.PartialWrite(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
514
	return msg, metadata, err
515
516
}
517
518
func local_request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
519
	var protoReq SchemaPartialWriteRequest
520
	var metadata runtime.ServerMetadata
521
522
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
523
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
524
	}
525
526
	var (
527
		val string
528
		ok  bool
529
		err error
530
		_   = err
531
	)
532
533
	val, ok = pathParams["tenant_id"]
534
	if !ok {
535
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
536
	}
537
538
	protoReq.TenantId, err = runtime.String(val)
539
	if err != nil {
540
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
541
	}
542
543
	msg, err := server.PartialWrite(ctx, &protoReq)
544
	return msg, metadata, err
545
546
}
547
548
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
549
	var protoReq SchemaReadRequest
550
	var metadata runtime.ServerMetadata
551
552
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
553
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
554
	}
555
556
	var (
557
		val string
558
		ok  bool
559
		err error
560
		_   = err
561
	)
562
563
	val, ok = pathParams["tenant_id"]
564
	if !ok {
565
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
566
	}
567
568
	protoReq.TenantId, err = runtime.String(val)
569
	if err != nil {
570
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
571
	}
572
573
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
574
	return msg, metadata, err
575
576
}
577
578
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
579
	var protoReq SchemaReadRequest
580
	var metadata runtime.ServerMetadata
581
582
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
583
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
584
	}
585
586
	var (
587
		val string
588
		ok  bool
589
		err error
590
		_   = err
591
	)
592
593
	val, ok = pathParams["tenant_id"]
594
	if !ok {
595
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
596
	}
597
598
	protoReq.TenantId, err = runtime.String(val)
599
	if err != nil {
600
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
601
	}
602
603
	msg, err := server.Read(ctx, &protoReq)
604
	return msg, metadata, err
605
606
}
607
608
func request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
609
	var protoReq SchemaListRequest
610
	var metadata runtime.ServerMetadata
611
612
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
613
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
614
	}
615
616
	var (
617
		val string
618
		ok  bool
619
		err error
620
		_   = err
621
	)
622
623
	val, ok = pathParams["tenant_id"]
624
	if !ok {
625
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
626
	}
627
628
	protoReq.TenantId, err = runtime.String(val)
629
	if err != nil {
630
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
631
	}
632
633
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
634
	return msg, metadata, err
635
636
}
637
638
func local_request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
639
	var protoReq SchemaListRequest
640
	var metadata runtime.ServerMetadata
641
642
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
643
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
644
	}
645
646
	var (
647
		val string
648
		ok  bool
649
		err error
650
		_   = err
651
	)
652
653
	val, ok = pathParams["tenant_id"]
654
	if !ok {
655
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
656
	}
657
658
	protoReq.TenantId, err = runtime.String(val)
659
	if err != nil {
660
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
661
	}
662
663
	msg, err := server.List(ctx, &protoReq)
664
	return msg, metadata, err
665
666
}
667
668
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
669
	var protoReq DataWriteRequest
670
	var metadata runtime.ServerMetadata
671
672
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
673
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
674
	}
675
676
	var (
677
		val string
678
		ok  bool
679
		err error
680
		_   = err
681
	)
682
683
	val, ok = pathParams["tenant_id"]
684
	if !ok {
685
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
686
	}
687
688
	protoReq.TenantId, err = runtime.String(val)
689
	if err != nil {
690
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
691
	}
692
693
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
694
	return msg, metadata, err
695
696
}
697
698
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
699
	var protoReq DataWriteRequest
700
	var metadata runtime.ServerMetadata
701
702
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
703
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
704
	}
705
706
	var (
707
		val string
708
		ok  bool
709
		err error
710
		_   = err
711
	)
712
713
	val, ok = pathParams["tenant_id"]
714
	if !ok {
715
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
716
	}
717
718
	protoReq.TenantId, err = runtime.String(val)
719
	if err != nil {
720
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
721
	}
722
723
	msg, err := server.Write(ctx, &protoReq)
724
	return msg, metadata, err
725
726
}
727
728
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
729
	var protoReq RelationshipWriteRequest
730
	var metadata runtime.ServerMetadata
731
732
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
733
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
734
	}
735
736
	var (
737
		val string
738
		ok  bool
739
		err error
740
		_   = err
741
	)
742
743
	val, ok = pathParams["tenant_id"]
744
	if !ok {
745
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
746
	}
747
748
	protoReq.TenantId, err = runtime.String(val)
749
	if err != nil {
750
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
751
	}
752
753
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
754
	return msg, metadata, err
755
756
}
757
758
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
759
	var protoReq RelationshipWriteRequest
760
	var metadata runtime.ServerMetadata
761
762
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
763
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
764
	}
765
766
	var (
767
		val string
768
		ok  bool
769
		err error
770
		_   = err
771
	)
772
773
	val, ok = pathParams["tenant_id"]
774
	if !ok {
775
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
776
	}
777
778
	protoReq.TenantId, err = runtime.String(val)
779
	if err != nil {
780
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
781
	}
782
783
	msg, err := server.WriteRelationships(ctx, &protoReq)
784
	return msg, metadata, err
785
786
}
787
788
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
789
	var protoReq RelationshipReadRequest
790
	var metadata runtime.ServerMetadata
791
792
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
793
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
794
	}
795
796
	var (
797
		val string
798
		ok  bool
799
		err error
800
		_   = err
801
	)
802
803
	val, ok = pathParams["tenant_id"]
804
	if !ok {
805
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
806
	}
807
808
	protoReq.TenantId, err = runtime.String(val)
809
	if err != nil {
810
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
811
	}
812
813
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
814
	return msg, metadata, err
815
816
}
817
818
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
819
	var protoReq RelationshipReadRequest
820
	var metadata runtime.ServerMetadata
821
822
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
823
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
824
	}
825
826
	var (
827
		val string
828
		ok  bool
829
		err error
830
		_   = err
831
	)
832
833
	val, ok = pathParams["tenant_id"]
834
	if !ok {
835
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
836
	}
837
838
	protoReq.TenantId, err = runtime.String(val)
839
	if err != nil {
840
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
841
	}
842
843
	msg, err := server.ReadRelationships(ctx, &protoReq)
844
	return msg, metadata, err
845
846
}
847
848
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
849
	var protoReq AttributeReadRequest
850
	var metadata runtime.ServerMetadata
851
852
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
853
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
854
	}
855
856
	var (
857
		val string
858
		ok  bool
859
		err error
860
		_   = err
861
	)
862
863
	val, ok = pathParams["tenant_id"]
864
	if !ok {
865
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
866
	}
867
868
	protoReq.TenantId, err = runtime.String(val)
869
	if err != nil {
870
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
871
	}
872
873
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
874
	return msg, metadata, err
875
876
}
877
878
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
879
	var protoReq AttributeReadRequest
880
	var metadata runtime.ServerMetadata
881
882
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
883
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
884
	}
885
886
	var (
887
		val string
888
		ok  bool
889
		err error
890
		_   = err
891
	)
892
893
	val, ok = pathParams["tenant_id"]
894
	if !ok {
895
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
896
	}
897
898
	protoReq.TenantId, err = runtime.String(val)
899
	if err != nil {
900
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
901
	}
902
903
	msg, err := server.ReadAttributes(ctx, &protoReq)
904
	return msg, metadata, err
905
906
}
907
908
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
909
	var protoReq DataDeleteRequest
910
	var metadata runtime.ServerMetadata
911
912
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
913
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
914
	}
915
916
	var (
917
		val string
918
		ok  bool
919
		err error
920
		_   = err
921
	)
922
923
	val, ok = pathParams["tenant_id"]
924
	if !ok {
925
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
926
	}
927
928
	protoReq.TenantId, err = runtime.String(val)
929
	if err != nil {
930
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
931
	}
932
933
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
934
	return msg, metadata, err
935
936
}
937
938
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
939
	var protoReq DataDeleteRequest
940
	var metadata runtime.ServerMetadata
941
942
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
943
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
944
	}
945
946
	var (
947
		val string
948
		ok  bool
949
		err error
950
		_   = err
951
	)
952
953
	val, ok = pathParams["tenant_id"]
954
	if !ok {
955
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
956
	}
957
958
	protoReq.TenantId, err = runtime.String(val)
959
	if err != nil {
960
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
961
	}
962
963
	msg, err := server.Delete(ctx, &protoReq)
964
	return msg, metadata, err
965
966
}
967
968
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
969
	var protoReq RelationshipDeleteRequest
970
	var metadata runtime.ServerMetadata
971
972
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
973
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
974
	}
975
976
	var (
977
		val string
978
		ok  bool
979
		err error
980
		_   = err
981
	)
982
983
	val, ok = pathParams["tenant_id"]
984
	if !ok {
985
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
986
	}
987
988
	protoReq.TenantId, err = runtime.String(val)
989
	if err != nil {
990
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
991
	}
992
993
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
994
	return msg, metadata, err
995
996
}
997
998
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
999
	var protoReq RelationshipDeleteRequest
1000
	var metadata runtime.ServerMetadata
1001
1002
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1003
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1004
	}
1005
1006
	var (
1007
		val string
1008
		ok  bool
1009
		err error
1010
		_   = err
1011
	)
1012
1013
	val, ok = pathParams["tenant_id"]
1014
	if !ok {
1015
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1016
	}
1017
1018
	protoReq.TenantId, err = runtime.String(val)
1019
	if err != nil {
1020
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1021
	}
1022
1023
	msg, err := server.DeleteRelationships(ctx, &protoReq)
1024
	return msg, metadata, err
1025
1026
}
1027
1028
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1029
	var protoReq BundleRunRequest
1030
	var metadata runtime.ServerMetadata
1031
1032
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1033
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1034
	}
1035
1036
	var (
1037
		val string
1038
		ok  bool
1039
		err error
1040
		_   = err
1041
	)
1042
1043
	val, ok = pathParams["tenant_id"]
1044
	if !ok {
1045
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1046
	}
1047
1048
	protoReq.TenantId, err = runtime.String(val)
1049
	if err != nil {
1050
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1051
	}
1052
1053
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1054
	return msg, metadata, err
1055
1056
}
1057
1058
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1059
	var protoReq BundleRunRequest
1060
	var metadata runtime.ServerMetadata
1061
1062
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1063
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1064
	}
1065
1066
	var (
1067
		val string
1068
		ok  bool
1069
		err error
1070
		_   = err
1071
	)
1072
1073
	val, ok = pathParams["tenant_id"]
1074
	if !ok {
1075
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1076
	}
1077
1078
	protoReq.TenantId, err = runtime.String(val)
1079
	if err != nil {
1080
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1081
	}
1082
1083
	msg, err := server.RunBundle(ctx, &protoReq)
1084
	return msg, metadata, err
1085
1086
}
1087
1088
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1089
	var protoReq BundleWriteRequest
1090
	var metadata runtime.ServerMetadata
1091
1092
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1093
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1094
	}
1095
1096
	var (
1097
		val string
1098
		ok  bool
1099
		err error
1100
		_   = err
1101
	)
1102
1103
	val, ok = pathParams["tenant_id"]
1104
	if !ok {
1105
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1106
	}
1107
1108
	protoReq.TenantId, err = runtime.String(val)
1109
	if err != nil {
1110
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1111
	}
1112
1113
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1114
	return msg, metadata, err
1115
1116
}
1117
1118
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1119
	var protoReq BundleWriteRequest
1120
	var metadata runtime.ServerMetadata
1121
1122
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1123
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1124
	}
1125
1126
	var (
1127
		val string
1128
		ok  bool
1129
		err error
1130
		_   = err
1131
	)
1132
1133
	val, ok = pathParams["tenant_id"]
1134
	if !ok {
1135
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1136
	}
1137
1138
	protoReq.TenantId, err = runtime.String(val)
1139
	if err != nil {
1140
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1141
	}
1142
1143
	msg, err := server.Write(ctx, &protoReq)
1144
	return msg, metadata, err
1145
1146
}
1147
1148
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1149
	var protoReq BundleReadRequest
1150
	var metadata runtime.ServerMetadata
1151
1152
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1153
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1154
	}
1155
1156
	var (
1157
		val string
1158
		ok  bool
1159
		err error
1160
		_   = err
1161
	)
1162
1163
	val, ok = pathParams["tenant_id"]
1164
	if !ok {
1165
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1166
	}
1167
1168
	protoReq.TenantId, err = runtime.String(val)
1169
	if err != nil {
1170
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1171
	}
1172
1173
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1174
	return msg, metadata, err
1175
1176
}
1177
1178
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1179
	var protoReq BundleReadRequest
1180
	var metadata runtime.ServerMetadata
1181
1182
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1183
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1184
	}
1185
1186
	var (
1187
		val string
1188
		ok  bool
1189
		err error
1190
		_   = err
1191
	)
1192
1193
	val, ok = pathParams["tenant_id"]
1194
	if !ok {
1195
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1196
	}
1197
1198
	protoReq.TenantId, err = runtime.String(val)
1199
	if err != nil {
1200
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1201
	}
1202
1203
	msg, err := server.Read(ctx, &protoReq)
1204
	return msg, metadata, err
1205
1206
}
1207
1208
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1209
	var protoReq BundleDeleteRequest
1210
	var metadata runtime.ServerMetadata
1211
1212
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1213
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1214
	}
1215
1216
	var (
1217
		val string
1218
		ok  bool
1219
		err error
1220
		_   = err
1221
	)
1222
1223
	val, ok = pathParams["tenant_id"]
1224
	if !ok {
1225
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1226
	}
1227
1228
	protoReq.TenantId, err = runtime.String(val)
1229
	if err != nil {
1230
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1231
	}
1232
1233
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1234
	return msg, metadata, err
1235
1236
}
1237
1238
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1239
	var protoReq BundleDeleteRequest
1240
	var metadata runtime.ServerMetadata
1241
1242
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1243
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1244
	}
1245
1246
	var (
1247
		val string
1248
		ok  bool
1249
		err error
1250
		_   = err
1251
	)
1252
1253
	val, ok = pathParams["tenant_id"]
1254
	if !ok {
1255
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1256
	}
1257
1258
	protoReq.TenantId, err = runtime.String(val)
1259
	if err != nil {
1260
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1261
	}
1262
1263
	msg, err := server.Delete(ctx, &protoReq)
1264
	return msg, metadata, err
1265
1266
}
1267
1268
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1269
	var protoReq TenantCreateRequest
1270
	var metadata runtime.ServerMetadata
1271
1272
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1273
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1274
	}
1275
1276
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1277
	return msg, metadata, err
1278
1279
}
1280
1281
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1282
	var protoReq TenantCreateRequest
1283
	var metadata runtime.ServerMetadata
1284
1285
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1286
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1287
	}
1288
1289
	msg, err := server.Create(ctx, &protoReq)
1290
	return msg, metadata, err
1291
1292
}
1293
1294
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1295
	var protoReq TenantDeleteRequest
1296
	var metadata runtime.ServerMetadata
1297
1298
	var (
1299
		val string
1300
		ok  bool
1301
		err error
1302
		_   = err
1303
	)
1304
1305
	val, ok = pathParams["id"]
1306
	if !ok {
1307
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1308
	}
1309
1310
	protoReq.Id, err = runtime.String(val)
1311
	if err != nil {
1312
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1313
	}
1314
1315
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1316
	return msg, metadata, err
1317
1318
}
1319
1320
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1321
	var protoReq TenantDeleteRequest
1322
	var metadata runtime.ServerMetadata
1323
1324
	var (
1325
		val string
1326
		ok  bool
1327
		err error
1328
		_   = err
1329
	)
1330
1331
	val, ok = pathParams["id"]
1332
	if !ok {
1333
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1334
	}
1335
1336
	protoReq.Id, err = runtime.String(val)
1337
	if err != nil {
1338
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1339
	}
1340
1341
	msg, err := server.Delete(ctx, &protoReq)
1342
	return msg, metadata, err
1343
1344
}
1345
1346
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1347
	var protoReq TenantListRequest
1348
	var metadata runtime.ServerMetadata
1349
1350
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1351
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1352
	}
1353
1354
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1355
	return msg, metadata, err
1356
1357
}
1358
1359
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1360
	var protoReq TenantListRequest
1361
	var metadata runtime.ServerMetadata
1362
1363
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1364
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1365
	}
1366
1367
	msg, err := server.List(ctx, &protoReq)
1368
	return msg, metadata, err
1369
1370
}
1371
1372
// RegisterHealthHandlerServer registers the http handlers for service Health to "mux".
1373
// UnaryRPC     :call HealthServer directly.
1374
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1375
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterHealthHandlerFromEndpoint instead.
1376
func RegisterHealthHandlerServer(ctx context.Context, mux *runtime.ServeMux, server HealthServer) error {
1377
1378
	mux.Handle("GET", pattern_Health_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1379
		ctx, cancel := context.WithCancel(req.Context())
1380
		defer cancel()
1381
		var stream runtime.ServerTransportStream
1382
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1383
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1384
		var err error
1385
		var annotatedContext context.Context
1386
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Health/Check", runtime.WithHTTPPathPattern("/healthz"))
1387
		if err != nil {
1388
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1389
			return
1390
		}
1391
		resp, md, err := local_request_Health_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1392
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1393
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1394
		if err != nil {
1395
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1396
			return
1397
		}
1398
1399
		forward_Health_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1400
1401
	})
1402
1403
	return nil
1404
}
1405
1406
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1407
// UnaryRPC     :call PermissionServer directly.
1408
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1409
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1410
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1411
1412
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1413
		ctx, cancel := context.WithCancel(req.Context())
1414
		defer cancel()
1415
		var stream runtime.ServerTransportStream
1416
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1417
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1418
		var err error
1419
		var annotatedContext context.Context
1420
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1421
		if err != nil {
1422
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1423
			return
1424
		}
1425
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1426
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1427
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1428
		if err != nil {
1429
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1430
			return
1431
		}
1432
1433
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1434
1435
	})
1436
1437
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1438
		ctx, cancel := context.WithCancel(req.Context())
1439
		defer cancel()
1440
		var stream runtime.ServerTransportStream
1441
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1442
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1443
		var err error
1444
		var annotatedContext context.Context
1445
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1446
		if err != nil {
1447
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1448
			return
1449
		}
1450
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1451
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1452
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1453
		if err != nil {
1454
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1455
			return
1456
		}
1457
1458
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1459
1460
	})
1461
1462
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1463
		ctx, cancel := context.WithCancel(req.Context())
1464
		defer cancel()
1465
		var stream runtime.ServerTransportStream
1466
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1467
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1468
		var err error
1469
		var annotatedContext context.Context
1470
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1471
		if err != nil {
1472
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1473
			return
1474
		}
1475
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1476
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1477
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1478
		if err != nil {
1479
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1480
			return
1481
		}
1482
1483
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1484
1485
	})
1486
1487
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1488
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1489
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1490
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1491
		return
1492
	})
1493
1494
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1495
		ctx, cancel := context.WithCancel(req.Context())
1496
		defer cancel()
1497
		var stream runtime.ServerTransportStream
1498
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1499
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1500
		var err error
1501
		var annotatedContext context.Context
1502
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1503
		if err != nil {
1504
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1505
			return
1506
		}
1507
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1508
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1509
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1510
		if err != nil {
1511
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1512
			return
1513
		}
1514
1515
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1516
1517
	})
1518
1519
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1520
		ctx, cancel := context.WithCancel(req.Context())
1521
		defer cancel()
1522
		var stream runtime.ServerTransportStream
1523
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1524
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1525
		var err error
1526
		var annotatedContext context.Context
1527
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1528
		if err != nil {
1529
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1530
			return
1531
		}
1532
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1533
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1534
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1535
		if err != nil {
1536
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1537
			return
1538
		}
1539
1540
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1541
1542
	})
1543
1544
	return nil
1545
}
1546
1547
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1548
// UnaryRPC     :call WatchServer directly.
1549
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1550
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1551
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1552
1553
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1554
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1555
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1556
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1557
		return
1558
	})
1559
1560
	return nil
1561
}
1562
1563
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1564
// UnaryRPC     :call SchemaServer directly.
1565
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1566
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1567
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1568
1569
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1570
		ctx, cancel := context.WithCancel(req.Context())
1571
		defer cancel()
1572
		var stream runtime.ServerTransportStream
1573
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1574
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1575
		var err error
1576
		var annotatedContext context.Context
1577
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1578
		if err != nil {
1579
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1580
			return
1581
		}
1582
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1583
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1584
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1585
		if err != nil {
1586
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1587
			return
1588
		}
1589
1590
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1591
1592
	})
1593
1594
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1595
		ctx, cancel := context.WithCancel(req.Context())
1596
		defer cancel()
1597
		var stream runtime.ServerTransportStream
1598
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1599
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1600
		var err error
1601
		var annotatedContext context.Context
1602
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
1603
		if err != nil {
1604
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1605
			return
1606
		}
1607
		resp, md, err := local_request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1608
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1609
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1610
		if err != nil {
1611
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1612
			return
1613
		}
1614
1615
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1616
1617
	})
1618
1619
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1620
		ctx, cancel := context.WithCancel(req.Context())
1621
		defer cancel()
1622
		var stream runtime.ServerTransportStream
1623
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1624
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1625
		var err error
1626
		var annotatedContext context.Context
1627
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1628
		if err != nil {
1629
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1630
			return
1631
		}
1632
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1633
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1634
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1635
		if err != nil {
1636
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1637
			return
1638
		}
1639
1640
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1641
1642
	})
1643
1644
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1645
		ctx, cancel := context.WithCancel(req.Context())
1646
		defer cancel()
1647
		var stream runtime.ServerTransportStream
1648
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1649
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1650
		var err error
1651
		var annotatedContext context.Context
1652
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
1653
		if err != nil {
1654
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1655
			return
1656
		}
1657
		resp, md, err := local_request_Schema_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1658
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1659
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1660
		if err != nil {
1661
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1662
			return
1663
		}
1664
1665
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1666
1667
	})
1668
1669
	return nil
1670
}
1671
1672
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1673
// UnaryRPC     :call DataServer directly.
1674
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1675
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1676
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1677
1678
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1679
		ctx, cancel := context.WithCancel(req.Context())
1680
		defer cancel()
1681
		var stream runtime.ServerTransportStream
1682
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1683
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1684
		var err error
1685
		var annotatedContext context.Context
1686
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1687
		if err != nil {
1688
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1689
			return
1690
		}
1691
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1692
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1693
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1694
		if err != nil {
1695
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1696
			return
1697
		}
1698
1699
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1700
1701
	})
1702
1703
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1704
		ctx, cancel := context.WithCancel(req.Context())
1705
		defer cancel()
1706
		var stream runtime.ServerTransportStream
1707
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1708
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1709
		var err error
1710
		var annotatedContext context.Context
1711
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1712
		if err != nil {
1713
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1714
			return
1715
		}
1716
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1717
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1718
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1719
		if err != nil {
1720
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1721
			return
1722
		}
1723
1724
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1725
1726
	})
1727
1728
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1729
		ctx, cancel := context.WithCancel(req.Context())
1730
		defer cancel()
1731
		var stream runtime.ServerTransportStream
1732
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1733
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1734
		var err error
1735
		var annotatedContext context.Context
1736
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1737
		if err != nil {
1738
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1739
			return
1740
		}
1741
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1742
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1743
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1744
		if err != nil {
1745
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1746
			return
1747
		}
1748
1749
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1750
1751
	})
1752
1753
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1754
		ctx, cancel := context.WithCancel(req.Context())
1755
		defer cancel()
1756
		var stream runtime.ServerTransportStream
1757
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1758
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1759
		var err error
1760
		var annotatedContext context.Context
1761
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1762
		if err != nil {
1763
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1764
			return
1765
		}
1766
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1767
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1768
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1769
		if err != nil {
1770
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1771
			return
1772
		}
1773
1774
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1775
1776
	})
1777
1778
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1779
		ctx, cancel := context.WithCancel(req.Context())
1780
		defer cancel()
1781
		var stream runtime.ServerTransportStream
1782
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1783
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1784
		var err error
1785
		var annotatedContext context.Context
1786
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1787
		if err != nil {
1788
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1789
			return
1790
		}
1791
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1792
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1793
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1794
		if err != nil {
1795
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1796
			return
1797
		}
1798
1799
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1800
1801
	})
1802
1803
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1804
		ctx, cancel := context.WithCancel(req.Context())
1805
		defer cancel()
1806
		var stream runtime.ServerTransportStream
1807
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1808
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1809
		var err error
1810
		var annotatedContext context.Context
1811
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1812
		if err != nil {
1813
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1814
			return
1815
		}
1816
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1817
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1818
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1819
		if err != nil {
1820
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1821
			return
1822
		}
1823
1824
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1825
1826
	})
1827
1828
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1829
		ctx, cancel := context.WithCancel(req.Context())
1830
		defer cancel()
1831
		var stream runtime.ServerTransportStream
1832
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1833
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1834
		var err error
1835
		var annotatedContext context.Context
1836
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1837
		if err != nil {
1838
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1839
			return
1840
		}
1841
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1842
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1843
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1844
		if err != nil {
1845
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1846
			return
1847
		}
1848
1849
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1850
1851
	})
1852
1853
	return nil
1854
}
1855
1856
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1857
// UnaryRPC     :call BundleServer directly.
1858
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1859
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1860
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1861
1862
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1863
		ctx, cancel := context.WithCancel(req.Context())
1864
		defer cancel()
1865
		var stream runtime.ServerTransportStream
1866
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1867
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1868
		var err error
1869
		var annotatedContext context.Context
1870
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1871
		if err != nil {
1872
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1873
			return
1874
		}
1875
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1876
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1877
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1878
		if err != nil {
1879
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1880
			return
1881
		}
1882
1883
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1884
1885
	})
1886
1887
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1888
		ctx, cancel := context.WithCancel(req.Context())
1889
		defer cancel()
1890
		var stream runtime.ServerTransportStream
1891
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1892
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1893
		var err error
1894
		var annotatedContext context.Context
1895
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
1896
		if err != nil {
1897
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1898
			return
1899
		}
1900
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1901
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1902
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1903
		if err != nil {
1904
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1905
			return
1906
		}
1907
1908
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1909
1910
	})
1911
1912
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1913
		ctx, cancel := context.WithCancel(req.Context())
1914
		defer cancel()
1915
		var stream runtime.ServerTransportStream
1916
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1917
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1918
		var err error
1919
		var annotatedContext context.Context
1920
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
1921
		if err != nil {
1922
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1923
			return
1924
		}
1925
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1926
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1927
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1928
		if err != nil {
1929
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1930
			return
1931
		}
1932
1933
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1934
1935
	})
1936
1937
	return nil
1938
}
1939
1940
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
1941
// UnaryRPC     :call TenancyServer directly.
1942
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1943
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
1944
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
1945
1946
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1947
		ctx, cancel := context.WithCancel(req.Context())
1948
		defer cancel()
1949
		var stream runtime.ServerTransportStream
1950
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1951
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1952
		var err error
1953
		var annotatedContext context.Context
1954
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
1955
		if err != nil {
1956
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1957
			return
1958
		}
1959
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1960
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1961
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1962
		if err != nil {
1963
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1964
			return
1965
		}
1966
1967
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1968
1969
	})
1970
1971
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1972
		ctx, cancel := context.WithCancel(req.Context())
1973
		defer cancel()
1974
		var stream runtime.ServerTransportStream
1975
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1976
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1977
		var err error
1978
		var annotatedContext context.Context
1979
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
1980
		if err != nil {
1981
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1982
			return
1983
		}
1984
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1985
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1986
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1987
		if err != nil {
1988
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1989
			return
1990
		}
1991
1992
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1993
1994
	})
1995
1996
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1997
		ctx, cancel := context.WithCancel(req.Context())
1998
		defer cancel()
1999
		var stream runtime.ServerTransportStream
2000
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2001
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2002
		var err error
2003
		var annotatedContext context.Context
2004
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2005
		if err != nil {
2006
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2007
			return
2008
		}
2009
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2010
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2011
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2012
		if err != nil {
2013
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2014
			return
2015
		}
2016
2017
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2018
2019
	})
2020
2021
	return nil
2022
}
2023
2024
// RegisterHealthHandlerFromEndpoint is same as RegisterHealthHandler but
2025
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2026
func RegisterHealthHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2027
	conn, err := grpc.NewClient(endpoint, opts...)
2028
	if err != nil {
2029
		return err
2030
	}
2031
	defer func() {
2032
		if err != nil {
2033
			if cerr := conn.Close(); cerr != nil {
2034
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2035
			}
2036
			return
2037
		}
2038
		go func() {
2039
			<-ctx.Done()
2040
			if cerr := conn.Close(); cerr != nil {
2041
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2042
			}
2043
		}()
2044
	}()
2045
2046
	return RegisterHealthHandler(ctx, mux, conn)
2047
}
2048
2049
// RegisterHealthHandler registers the http handlers for service Health to "mux".
2050
// The handlers forward requests to the grpc endpoint over "conn".
2051
func RegisterHealthHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2052
	return RegisterHealthHandlerClient(ctx, mux, NewHealthClient(conn))
2053
}
2054
2055
// RegisterHealthHandlerClient registers the http handlers for service Health
2056
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "HealthClient".
2057
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "HealthClient"
2058
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2059
// "HealthClient" to call the correct interceptors.
2060
func RegisterHealthHandlerClient(ctx context.Context, mux *runtime.ServeMux, client HealthClient) error {
2061
2062
	mux.Handle("GET", pattern_Health_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2063
		ctx, cancel := context.WithCancel(req.Context())
2064
		defer cancel()
2065
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2066
		var err error
2067
		var annotatedContext context.Context
2068
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Health/Check", runtime.WithHTTPPathPattern("/healthz"))
2069
		if err != nil {
2070
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2071
			return
2072
		}
2073
		resp, md, err := request_Health_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2074
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2075
		if err != nil {
2076
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2077
			return
2078
		}
2079
2080
		forward_Health_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2081
2082
	})
2083
2084
	return nil
2085
}
2086
2087
var (
2088
	pattern_Health_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, ""))
2089
)
2090
2091
var (
2092
	forward_Health_Check_0 = runtime.ForwardResponseMessage
2093
)
2094
2095
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
2096
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2097
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2098
	conn, err := grpc.NewClient(endpoint, opts...)
2099
	if err != nil {
2100
		return err
2101
	}
2102
	defer func() {
2103
		if err != nil {
2104
			if cerr := conn.Close(); cerr != nil {
2105
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2106
			}
2107
			return
2108
		}
2109
		go func() {
2110
			<-ctx.Done()
2111
			if cerr := conn.Close(); cerr != nil {
2112
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2113
			}
2114
		}()
2115
	}()
2116
2117
	return RegisterPermissionHandler(ctx, mux, conn)
2118
}
2119
2120
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
2121
// The handlers forward requests to the grpc endpoint over "conn".
2122
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2123
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
2124
}
2125
2126
// RegisterPermissionHandlerClient registers the http handlers for service Permission
2127
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
2128
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
2129
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2130
// "PermissionClient" to call the correct interceptors.
2131
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
2132
2133
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2134
		ctx, cancel := context.WithCancel(req.Context())
2135
		defer cancel()
2136
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2137
		var err error
2138
		var annotatedContext context.Context
2139
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2140
		if err != nil {
2141
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2142
			return
2143
		}
2144
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2145
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2146
		if err != nil {
2147
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2148
			return
2149
		}
2150
2151
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2152
2153
	})
2154
2155
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2156
		ctx, cancel := context.WithCancel(req.Context())
2157
		defer cancel()
2158
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2159
		var err error
2160
		var annotatedContext context.Context
2161
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2162
		if err != nil {
2163
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2164
			return
2165
		}
2166
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2167
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2168
		if err != nil {
2169
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2170
			return
2171
		}
2172
2173
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2174
2175
	})
2176
2177
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2178
		ctx, cancel := context.WithCancel(req.Context())
2179
		defer cancel()
2180
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2181
		var err error
2182
		var annotatedContext context.Context
2183
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2184
		if err != nil {
2185
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2186
			return
2187
		}
2188
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2189
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2190
		if err != nil {
2191
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2192
			return
2193
		}
2194
2195
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2196
2197
	})
2198
2199
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2200
		ctx, cancel := context.WithCancel(req.Context())
2201
		defer cancel()
2202
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2203
		var err error
2204
		var annotatedContext context.Context
2205
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2206
		if err != nil {
2207
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2208
			return
2209
		}
2210
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2211
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2212
		if err != nil {
2213
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2214
			return
2215
		}
2216
2217
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2218
2219
	})
2220
2221
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2222
		ctx, cancel := context.WithCancel(req.Context())
2223
		defer cancel()
2224
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2225
		var err error
2226
		var annotatedContext context.Context
2227
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2228
		if err != nil {
2229
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2230
			return
2231
		}
2232
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2233
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2234
		if err != nil {
2235
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2236
			return
2237
		}
2238
2239
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2240
2241
	})
2242
2243
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2244
		ctx, cancel := context.WithCancel(req.Context())
2245
		defer cancel()
2246
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2247
		var err error
2248
		var annotatedContext context.Context
2249
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2250
		if err != nil {
2251
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2252
			return
2253
		}
2254
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2255
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2256
		if err != nil {
2257
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2258
			return
2259
		}
2260
2261
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2262
2263
	})
2264
2265
	return nil
2266
}
2267
2268
var (
2269
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2270
2271
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2272
2273
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2274
2275
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2276
2277
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2278
2279
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2280
)
2281
2282
var (
2283
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2284
2285
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2286
2287
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2288
2289
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2290
2291
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2292
2293
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2294
)
2295
2296
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2297
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2298
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2299
	conn, err := grpc.NewClient(endpoint, opts...)
2300
	if err != nil {
2301
		return err
2302
	}
2303
	defer func() {
2304
		if err != nil {
2305
			if cerr := conn.Close(); cerr != nil {
2306
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2307
			}
2308
			return
2309
		}
2310
		go func() {
2311
			<-ctx.Done()
2312
			if cerr := conn.Close(); cerr != nil {
2313
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2314
			}
2315
		}()
2316
	}()
2317
2318
	return RegisterWatchHandler(ctx, mux, conn)
2319
}
2320
2321
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2322
// The handlers forward requests to the grpc endpoint over "conn".
2323
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2324
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2325
}
2326
2327
// RegisterWatchHandlerClient registers the http handlers for service Watch
2328
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2329
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2330
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2331
// "WatchClient" to call the correct interceptors.
2332
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2333
2334
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2335
		ctx, cancel := context.WithCancel(req.Context())
2336
		defer cancel()
2337
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2338
		var err error
2339
		var annotatedContext context.Context
2340
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2341
		if err != nil {
2342
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2343
			return
2344
		}
2345
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2346
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2347
		if err != nil {
2348
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2349
			return
2350
		}
2351
2352
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2353
2354
	})
2355
2356
	return nil
2357
}
2358
2359
var (
2360
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2361
)
2362
2363
var (
2364
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2365
)
2366
2367
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2368
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2369
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2370
	conn, err := grpc.NewClient(endpoint, opts...)
2371
	if err != nil {
2372
		return err
2373
	}
2374
	defer func() {
2375
		if err != nil {
2376
			if cerr := conn.Close(); cerr != nil {
2377
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2378
			}
2379
			return
2380
		}
2381
		go func() {
2382
			<-ctx.Done()
2383
			if cerr := conn.Close(); cerr != nil {
2384
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2385
			}
2386
		}()
2387
	}()
2388
2389
	return RegisterSchemaHandler(ctx, mux, conn)
2390
}
2391
2392
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2393
// The handlers forward requests to the grpc endpoint over "conn".
2394
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2395
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2396
}
2397
2398
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2399
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2400
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2401
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2402
// "SchemaClient" to call the correct interceptors.
2403
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2404
2405
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2406
		ctx, cancel := context.WithCancel(req.Context())
2407
		defer cancel()
2408
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2409
		var err error
2410
		var annotatedContext context.Context
2411
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2412
		if err != nil {
2413
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2414
			return
2415
		}
2416
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2417
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2418
		if err != nil {
2419
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2420
			return
2421
		}
2422
2423
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2424
2425
	})
2426
2427
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2428
		ctx, cancel := context.WithCancel(req.Context())
2429
		defer cancel()
2430
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2431
		var err error
2432
		var annotatedContext context.Context
2433
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
2434
		if err != nil {
2435
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2436
			return
2437
		}
2438
		resp, md, err := request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2439
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2440
		if err != nil {
2441
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2442
			return
2443
		}
2444
2445
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2446
2447
	})
2448
2449
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2450
		ctx, cancel := context.WithCancel(req.Context())
2451
		defer cancel()
2452
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2453
		var err error
2454
		var annotatedContext context.Context
2455
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2456
		if err != nil {
2457
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2458
			return
2459
		}
2460
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2461
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2462
		if err != nil {
2463
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2464
			return
2465
		}
2466
2467
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2468
2469
	})
2470
2471
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2472
		ctx, cancel := context.WithCancel(req.Context())
2473
		defer cancel()
2474
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2475
		var err error
2476
		var annotatedContext context.Context
2477
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
2478
		if err != nil {
2479
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2480
			return
2481
		}
2482
		resp, md, err := request_Schema_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2483
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2484
		if err != nil {
2485
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2486
			return
2487
		}
2488
2489
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2490
2491
	})
2492
2493
	return nil
2494
}
2495
2496
var (
2497
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2498
2499
	pattern_Schema_PartialWrite_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "partial-write"}, ""))
2500
2501
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2502
2503
	pattern_Schema_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "list"}, ""))
2504
)
2505
2506
var (
2507
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2508
2509
	forward_Schema_PartialWrite_0 = runtime.ForwardResponseMessage
2510
2511
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2512
2513
	forward_Schema_List_0 = runtime.ForwardResponseMessage
2514
)
2515
2516
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2517
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2518
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2519
	conn, err := grpc.NewClient(endpoint, opts...)
2520
	if err != nil {
2521
		return err
2522
	}
2523
	defer func() {
2524
		if err != nil {
2525
			if cerr := conn.Close(); cerr != nil {
2526
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2527
			}
2528
			return
2529
		}
2530
		go func() {
2531
			<-ctx.Done()
2532
			if cerr := conn.Close(); cerr != nil {
2533
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2534
			}
2535
		}()
2536
	}()
2537
2538
	return RegisterDataHandler(ctx, mux, conn)
2539
}
2540
2541
// RegisterDataHandler registers the http handlers for service Data to "mux".
2542
// The handlers forward requests to the grpc endpoint over "conn".
2543
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2544
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2545
}
2546
2547
// RegisterDataHandlerClient registers the http handlers for service Data
2548
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2549
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2550
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2551
// "DataClient" to call the correct interceptors.
2552
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2553
2554
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2555
		ctx, cancel := context.WithCancel(req.Context())
2556
		defer cancel()
2557
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2558
		var err error
2559
		var annotatedContext context.Context
2560
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2561
		if err != nil {
2562
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2563
			return
2564
		}
2565
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2566
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2567
		if err != nil {
2568
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2569
			return
2570
		}
2571
2572
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2573
2574
	})
2575
2576
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2577
		ctx, cancel := context.WithCancel(req.Context())
2578
		defer cancel()
2579
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2580
		var err error
2581
		var annotatedContext context.Context
2582
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2583
		if err != nil {
2584
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2585
			return
2586
		}
2587
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2588
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2589
		if err != nil {
2590
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2591
			return
2592
		}
2593
2594
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2595
2596
	})
2597
2598
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2599
		ctx, cancel := context.WithCancel(req.Context())
2600
		defer cancel()
2601
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2602
		var err error
2603
		var annotatedContext context.Context
2604
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2605
		if err != nil {
2606
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2607
			return
2608
		}
2609
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2610
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2611
		if err != nil {
2612
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2613
			return
2614
		}
2615
2616
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2617
2618
	})
2619
2620
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2621
		ctx, cancel := context.WithCancel(req.Context())
2622
		defer cancel()
2623
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2624
		var err error
2625
		var annotatedContext context.Context
2626
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2627
		if err != nil {
2628
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2629
			return
2630
		}
2631
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2632
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2633
		if err != nil {
2634
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2635
			return
2636
		}
2637
2638
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2639
2640
	})
2641
2642
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2643
		ctx, cancel := context.WithCancel(req.Context())
2644
		defer cancel()
2645
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2646
		var err error
2647
		var annotatedContext context.Context
2648
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2649
		if err != nil {
2650
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2651
			return
2652
		}
2653
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2654
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2655
		if err != nil {
2656
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2657
			return
2658
		}
2659
2660
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2661
2662
	})
2663
2664
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2665
		ctx, cancel := context.WithCancel(req.Context())
2666
		defer cancel()
2667
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2668
		var err error
2669
		var annotatedContext context.Context
2670
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2671
		if err != nil {
2672
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2673
			return
2674
		}
2675
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2676
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2677
		if err != nil {
2678
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2679
			return
2680
		}
2681
2682
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2683
2684
	})
2685
2686
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2687
		ctx, cancel := context.WithCancel(req.Context())
2688
		defer cancel()
2689
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2690
		var err error
2691
		var annotatedContext context.Context
2692
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2693
		if err != nil {
2694
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2695
			return
2696
		}
2697
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2698
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2699
		if err != nil {
2700
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2701
			return
2702
		}
2703
2704
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2705
2706
	})
2707
2708
	return nil
2709
}
2710
2711
var (
2712
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2713
2714
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2715
2716
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2717
2718
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2719
2720
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2721
2722
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2723
2724
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2725
)
2726
2727
var (
2728
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2729
2730
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2731
2732
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2733
2734
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2735
2736
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2737
2738
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2739
2740
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2741
)
2742
2743
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2744
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2745
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2746
	conn, err := grpc.NewClient(endpoint, opts...)
2747
	if err != nil {
2748
		return err
2749
	}
2750
	defer func() {
2751
		if err != nil {
2752
			if cerr := conn.Close(); cerr != nil {
2753
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2754
			}
2755
			return
2756
		}
2757
		go func() {
2758
			<-ctx.Done()
2759
			if cerr := conn.Close(); cerr != nil {
2760
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2761
			}
2762
		}()
2763
	}()
2764
2765
	return RegisterBundleHandler(ctx, mux, conn)
2766
}
2767
2768
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2769
// The handlers forward requests to the grpc endpoint over "conn".
2770
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2771
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2772
}
2773
2774
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2775
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2776
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2777
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2778
// "BundleClient" to call the correct interceptors.
2779
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2780
2781
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2782
		ctx, cancel := context.WithCancel(req.Context())
2783
		defer cancel()
2784
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2785
		var err error
2786
		var annotatedContext context.Context
2787
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2788
		if err != nil {
2789
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2790
			return
2791
		}
2792
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2793
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2794
		if err != nil {
2795
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2796
			return
2797
		}
2798
2799
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2800
2801
	})
2802
2803
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2804
		ctx, cancel := context.WithCancel(req.Context())
2805
		defer cancel()
2806
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2807
		var err error
2808
		var annotatedContext context.Context
2809
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2810
		if err != nil {
2811
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2812
			return
2813
		}
2814
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2815
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2816
		if err != nil {
2817
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2818
			return
2819
		}
2820
2821
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2822
2823
	})
2824
2825
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2826
		ctx, cancel := context.WithCancel(req.Context())
2827
		defer cancel()
2828
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2829
		var err error
2830
		var annotatedContext context.Context
2831
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2832
		if err != nil {
2833
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2834
			return
2835
		}
2836
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2837
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2838
		if err != nil {
2839
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2840
			return
2841
		}
2842
2843
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2844
2845
	})
2846
2847
	return nil
2848
}
2849
2850
var (
2851
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2852
2853
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2854
2855
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2856
)
2857
2858
var (
2859
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2860
2861
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2862
2863
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2864
)
2865
2866
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2867
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2868
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2869
	conn, err := grpc.NewClient(endpoint, opts...)
2870
	if err != nil {
2871
		return err
2872
	}
2873
	defer func() {
2874
		if err != nil {
2875
			if cerr := conn.Close(); cerr != nil {
2876
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2877
			}
2878
			return
2879
		}
2880
		go func() {
2881
			<-ctx.Done()
2882
			if cerr := conn.Close(); cerr != nil {
2883
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2884
			}
2885
		}()
2886
	}()
2887
2888
	return RegisterTenancyHandler(ctx, mux, conn)
2889
}
2890
2891
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2892
// The handlers forward requests to the grpc endpoint over "conn".
2893
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2894
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2895
}
2896
2897
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2898
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2899
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2900
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2901
// "TenancyClient" to call the correct interceptors.
2902
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2903
2904
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2905
		ctx, cancel := context.WithCancel(req.Context())
2906
		defer cancel()
2907
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2908
		var err error
2909
		var annotatedContext context.Context
2910
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2911
		if err != nil {
2912
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2913
			return
2914
		}
2915
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2916
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2917
		if err != nil {
2918
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2919
			return
2920
		}
2921
2922
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2923
2924
	})
2925
2926
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2927
		ctx, cancel := context.WithCancel(req.Context())
2928
		defer cancel()
2929
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2930
		var err error
2931
		var annotatedContext context.Context
2932
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2933
		if err != nil {
2934
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2935
			return
2936
		}
2937
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2938
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2939
		if err != nil {
2940
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2941
			return
2942
		}
2943
2944
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2945
2946
	})
2947
2948
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2949
		ctx, cancel := context.WithCancel(req.Context())
2950
		defer cancel()
2951
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2952
		var err error
2953
		var annotatedContext context.Context
2954
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2955
		if err != nil {
2956
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2957
			return
2958
		}
2959
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2960
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2961
		if err != nil {
2962
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2963
			return
2964
		}
2965
2966
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2967
2968
	})
2969
2970
	return nil
2971
}
2972
2973
var (
2974
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
2975
2976
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
2977
2978
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
2979
)
2980
2981
var (
2982
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
2983
2984
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
2985
2986
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
2987
)
2988