Passed
Push — master ( 136f25...d79624 )
by Tolga
01:26 queued 27s
created

basev1.local_request_Schema_List_0   B

Complexity

Conditions 6

Size

Total Lines 31
Code Lines 21

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 6
eloc 21
nop 5
dl 0
loc 31
rs 8.4426
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq PermissionCheckRequest
36
	var metadata runtime.ServerMetadata
37
38
	newReader, berr := utilities.IOReaderFactory(req.Body)
39
	if berr != nil {
40
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
41
	}
42
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
43
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
44
	}
45
46
	var (
47
		val string
48
		ok  bool
49
		err error
50
		_   = err
51
	)
52
53
	val, ok = pathParams["tenant_id"]
54
	if !ok {
55
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
56
	}
57
58
	protoReq.TenantId, err = runtime.String(val)
59
	if err != nil {
60
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
61
	}
62
63
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
64
	return msg, metadata, err
65
66
}
67
68
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
69
	var protoReq PermissionCheckRequest
70
	var metadata runtime.ServerMetadata
71
72
	newReader, berr := utilities.IOReaderFactory(req.Body)
73
	if berr != nil {
74
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
75
	}
76
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
77
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
78
	}
79
80
	var (
81
		val string
82
		ok  bool
83
		err error
84
		_   = err
85
	)
86
87
	val, ok = pathParams["tenant_id"]
88
	if !ok {
89
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
90
	}
91
92
	protoReq.TenantId, err = runtime.String(val)
93
	if err != nil {
94
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
95
	}
96
97
	msg, err := server.Check(ctx, &protoReq)
98
	return msg, metadata, err
99
100
}
101
102
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
103
	var protoReq PermissionExpandRequest
104
	var metadata runtime.ServerMetadata
105
106
	newReader, berr := utilities.IOReaderFactory(req.Body)
107
	if berr != nil {
108
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
109
	}
110
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
111
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
112
	}
113
114
	var (
115
		val string
116
		ok  bool
117
		err error
118
		_   = err
119
	)
120
121
	val, ok = pathParams["tenant_id"]
122
	if !ok {
123
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
124
	}
125
126
	protoReq.TenantId, err = runtime.String(val)
127
	if err != nil {
128
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
129
	}
130
131
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
132
	return msg, metadata, err
133
134
}
135
136
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
137
	var protoReq PermissionExpandRequest
138
	var metadata runtime.ServerMetadata
139
140
	newReader, berr := utilities.IOReaderFactory(req.Body)
141
	if berr != nil {
142
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
143
	}
144
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
145
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
146
	}
147
148
	var (
149
		val string
150
		ok  bool
151
		err error
152
		_   = err
153
	)
154
155
	val, ok = pathParams["tenant_id"]
156
	if !ok {
157
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
158
	}
159
160
	protoReq.TenantId, err = runtime.String(val)
161
	if err != nil {
162
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
163
	}
164
165
	msg, err := server.Expand(ctx, &protoReq)
166
	return msg, metadata, err
167
168
}
169
170
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
171
	var protoReq PermissionLookupEntityRequest
172
	var metadata runtime.ServerMetadata
173
174
	newReader, berr := utilities.IOReaderFactory(req.Body)
175
	if berr != nil {
176
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
177
	}
178
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
179
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
180
	}
181
182
	var (
183
		val string
184
		ok  bool
185
		err error
186
		_   = err
187
	)
188
189
	val, ok = pathParams["tenant_id"]
190
	if !ok {
191
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
192
	}
193
194
	protoReq.TenantId, err = runtime.String(val)
195
	if err != nil {
196
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
197
	}
198
199
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
200
	return msg, metadata, err
201
202
}
203
204
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
205
	var protoReq PermissionLookupEntityRequest
206
	var metadata runtime.ServerMetadata
207
208
	newReader, berr := utilities.IOReaderFactory(req.Body)
209
	if berr != nil {
210
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
211
	}
212
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
213
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
214
	}
215
216
	var (
217
		val string
218
		ok  bool
219
		err error
220
		_   = err
221
	)
222
223
	val, ok = pathParams["tenant_id"]
224
	if !ok {
225
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
226
	}
227
228
	protoReq.TenantId, err = runtime.String(val)
229
	if err != nil {
230
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
231
	}
232
233
	msg, err := server.LookupEntity(ctx, &protoReq)
234
	return msg, metadata, err
235
236
}
237
238
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
239
	var protoReq PermissionLookupEntityRequest
240
	var metadata runtime.ServerMetadata
241
242
	newReader, berr := utilities.IOReaderFactory(req.Body)
243
	if berr != nil {
244
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
245
	}
246
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
247
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
248
	}
249
250
	var (
251
		val string
252
		ok  bool
253
		err error
254
		_   = err
255
	)
256
257
	val, ok = pathParams["tenant_id"]
258
	if !ok {
259
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
260
	}
261
262
	protoReq.TenantId, err = runtime.String(val)
263
	if err != nil {
264
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
265
	}
266
267
	stream, err := client.LookupEntityStream(ctx, &protoReq)
268
	if err != nil {
269
		return nil, metadata, err
270
	}
271
	header, err := stream.Header()
272
	if err != nil {
273
		return nil, metadata, err
274
	}
275
	metadata.HeaderMD = header
276
	return stream, metadata, nil
277
278
}
279
280
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
281
	var protoReq PermissionLookupSubjectRequest
282
	var metadata runtime.ServerMetadata
283
284
	newReader, berr := utilities.IOReaderFactory(req.Body)
285
	if berr != nil {
286
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
287
	}
288
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
289
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
290
	}
291
292
	var (
293
		val string
294
		ok  bool
295
		err error
296
		_   = err
297
	)
298
299
	val, ok = pathParams["tenant_id"]
300
	if !ok {
301
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
302
	}
303
304
	protoReq.TenantId, err = runtime.String(val)
305
	if err != nil {
306
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
307
	}
308
309
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
310
	return msg, metadata, err
311
312
}
313
314
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
315
	var protoReq PermissionLookupSubjectRequest
316
	var metadata runtime.ServerMetadata
317
318
	newReader, berr := utilities.IOReaderFactory(req.Body)
319
	if berr != nil {
320
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
321
	}
322
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
323
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
324
	}
325
326
	var (
327
		val string
328
		ok  bool
329
		err error
330
		_   = err
331
	)
332
333
	val, ok = pathParams["tenant_id"]
334
	if !ok {
335
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
336
	}
337
338
	protoReq.TenantId, err = runtime.String(val)
339
	if err != nil {
340
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
341
	}
342
343
	msg, err := server.LookupSubject(ctx, &protoReq)
344
	return msg, metadata, err
345
346
}
347
348
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
349
	var protoReq PermissionSubjectPermissionRequest
350
	var metadata runtime.ServerMetadata
351
352
	newReader, berr := utilities.IOReaderFactory(req.Body)
353
	if berr != nil {
354
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
355
	}
356
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
357
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
358
	}
359
360
	var (
361
		val string
362
		ok  bool
363
		err error
364
		_   = err
365
	)
366
367
	val, ok = pathParams["tenant_id"]
368
	if !ok {
369
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
370
	}
371
372
	protoReq.TenantId, err = runtime.String(val)
373
	if err != nil {
374
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
375
	}
376
377
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
378
	return msg, metadata, err
379
380
}
381
382
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
383
	var protoReq PermissionSubjectPermissionRequest
384
	var metadata runtime.ServerMetadata
385
386
	newReader, berr := utilities.IOReaderFactory(req.Body)
387
	if berr != nil {
388
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
389
	}
390
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
391
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
392
	}
393
394
	var (
395
		val string
396
		ok  bool
397
		err error
398
		_   = err
399
	)
400
401
	val, ok = pathParams["tenant_id"]
402
	if !ok {
403
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
404
	}
405
406
	protoReq.TenantId, err = runtime.String(val)
407
	if err != nil {
408
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
409
	}
410
411
	msg, err := server.SubjectPermission(ctx, &protoReq)
412
	return msg, metadata, err
413
414
}
415
416
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
417
	var protoReq WatchRequest
418
	var metadata runtime.ServerMetadata
419
420
	newReader, berr := utilities.IOReaderFactory(req.Body)
421
	if berr != nil {
422
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
423
	}
424
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
425
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
426
	}
427
428
	var (
429
		val string
430
		ok  bool
431
		err error
432
		_   = err
433
	)
434
435
	val, ok = pathParams["tenant_id"]
436
	if !ok {
437
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
438
	}
439
440
	protoReq.TenantId, err = runtime.String(val)
441
	if err != nil {
442
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
443
	}
444
445
	stream, err := client.Watch(ctx, &protoReq)
446
	if err != nil {
447
		return nil, metadata, err
448
	}
449
	header, err := stream.Header()
450
	if err != nil {
451
		return nil, metadata, err
452
	}
453
	metadata.HeaderMD = header
454
	return stream, metadata, nil
455
456
}
457
458
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
459
	var protoReq SchemaWriteRequest
460
	var metadata runtime.ServerMetadata
461
462
	newReader, berr := utilities.IOReaderFactory(req.Body)
463
	if berr != nil {
464
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
465
	}
466
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
467
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
468
	}
469
470
	var (
471
		val string
472
		ok  bool
473
		err error
474
		_   = err
475
	)
476
477
	val, ok = pathParams["tenant_id"]
478
	if !ok {
479
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
480
	}
481
482
	protoReq.TenantId, err = runtime.String(val)
483
	if err != nil {
484
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
485
	}
486
487
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
488
	return msg, metadata, err
489
490
}
491
492
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
493
	var protoReq SchemaWriteRequest
494
	var metadata runtime.ServerMetadata
495
496
	newReader, berr := utilities.IOReaderFactory(req.Body)
497
	if berr != nil {
498
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
499
	}
500
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
501
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
502
	}
503
504
	var (
505
		val string
506
		ok  bool
507
		err error
508
		_   = err
509
	)
510
511
	val, ok = pathParams["tenant_id"]
512
	if !ok {
513
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
514
	}
515
516
	protoReq.TenantId, err = runtime.String(val)
517
	if err != nil {
518
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
519
	}
520
521
	msg, err := server.Write(ctx, &protoReq)
522
	return msg, metadata, err
523
524
}
525
526
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
527
	var protoReq SchemaReadRequest
528
	var metadata runtime.ServerMetadata
529
530
	newReader, berr := utilities.IOReaderFactory(req.Body)
531
	if berr != nil {
532
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
533
	}
534
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
535
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
536
	}
537
538
	var (
539
		val string
540
		ok  bool
541
		err error
542
		_   = err
543
	)
544
545
	val, ok = pathParams["tenant_id"]
546
	if !ok {
547
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
548
	}
549
550
	protoReq.TenantId, err = runtime.String(val)
551
	if err != nil {
552
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
553
	}
554
555
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
556
	return msg, metadata, err
557
558
}
559
560
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
561
	var protoReq SchemaReadRequest
562
	var metadata runtime.ServerMetadata
563
564
	newReader, berr := utilities.IOReaderFactory(req.Body)
565
	if berr != nil {
566
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
567
	}
568
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
569
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
570
	}
571
572
	var (
573
		val string
574
		ok  bool
575
		err error
576
		_   = err
577
	)
578
579
	val, ok = pathParams["tenant_id"]
580
	if !ok {
581
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
582
	}
583
584
	protoReq.TenantId, err = runtime.String(val)
585
	if err != nil {
586
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
587
	}
588
589
	msg, err := server.Read(ctx, &protoReq)
590
	return msg, metadata, err
591
592
}
593
594
func request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
595
	var protoReq SchemaListRequest
596
	var metadata runtime.ServerMetadata
597
598
	newReader, berr := utilities.IOReaderFactory(req.Body)
599
	if berr != nil {
600
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
601
	}
602
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
603
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
604
	}
605
606
	var (
607
		val string
608
		ok  bool
609
		err error
610
		_   = err
611
	)
612
613
	val, ok = pathParams["tenant_id"]
614
	if !ok {
615
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
616
	}
617
618
	protoReq.TenantId, err = runtime.String(val)
619
	if err != nil {
620
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
621
	}
622
623
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
624
	return msg, metadata, err
625
626
}
627
628
func local_request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
629
	var protoReq SchemaListRequest
630
	var metadata runtime.ServerMetadata
631
632
	newReader, berr := utilities.IOReaderFactory(req.Body)
633
	if berr != nil {
634
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
635
	}
636
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
637
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
638
	}
639
640
	var (
641
		val string
642
		ok  bool
643
		err error
644
		_   = err
645
	)
646
647
	val, ok = pathParams["tenant_id"]
648
	if !ok {
649
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
650
	}
651
652
	protoReq.TenantId, err = runtime.String(val)
653
	if err != nil {
654
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
655
	}
656
657
	msg, err := server.List(ctx, &protoReq)
658
	return msg, metadata, err
659
660
}
661
662
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
663
	var protoReq DataWriteRequest
664
	var metadata runtime.ServerMetadata
665
666
	newReader, berr := utilities.IOReaderFactory(req.Body)
667
	if berr != nil {
668
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
669
	}
670
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
671
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
672
	}
673
674
	var (
675
		val string
676
		ok  bool
677
		err error
678
		_   = err
679
	)
680
681
	val, ok = pathParams["tenant_id"]
682
	if !ok {
683
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
684
	}
685
686
	protoReq.TenantId, err = runtime.String(val)
687
	if err != nil {
688
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
689
	}
690
691
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
692
	return msg, metadata, err
693
694
}
695
696
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
697
	var protoReq DataWriteRequest
698
	var metadata runtime.ServerMetadata
699
700
	newReader, berr := utilities.IOReaderFactory(req.Body)
701
	if berr != nil {
702
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
703
	}
704
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
705
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
706
	}
707
708
	var (
709
		val string
710
		ok  bool
711
		err error
712
		_   = err
713
	)
714
715
	val, ok = pathParams["tenant_id"]
716
	if !ok {
717
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
718
	}
719
720
	protoReq.TenantId, err = runtime.String(val)
721
	if err != nil {
722
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
723
	}
724
725
	msg, err := server.Write(ctx, &protoReq)
726
	return msg, metadata, err
727
728
}
729
730
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
731
	var protoReq RelationshipWriteRequest
732
	var metadata runtime.ServerMetadata
733
734
	newReader, berr := utilities.IOReaderFactory(req.Body)
735
	if berr != nil {
736
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
737
	}
738
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
739
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
740
	}
741
742
	var (
743
		val string
744
		ok  bool
745
		err error
746
		_   = err
747
	)
748
749
	val, ok = pathParams["tenant_id"]
750
	if !ok {
751
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
752
	}
753
754
	protoReq.TenantId, err = runtime.String(val)
755
	if err != nil {
756
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
757
	}
758
759
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
760
	return msg, metadata, err
761
762
}
763
764
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
765
	var protoReq RelationshipWriteRequest
766
	var metadata runtime.ServerMetadata
767
768
	newReader, berr := utilities.IOReaderFactory(req.Body)
769
	if berr != nil {
770
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
771
	}
772
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
773
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
774
	}
775
776
	var (
777
		val string
778
		ok  bool
779
		err error
780
		_   = err
781
	)
782
783
	val, ok = pathParams["tenant_id"]
784
	if !ok {
785
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
786
	}
787
788
	protoReq.TenantId, err = runtime.String(val)
789
	if err != nil {
790
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
791
	}
792
793
	msg, err := server.WriteRelationships(ctx, &protoReq)
794
	return msg, metadata, err
795
796
}
797
798
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
799
	var protoReq RelationshipReadRequest
800
	var metadata runtime.ServerMetadata
801
802
	newReader, berr := utilities.IOReaderFactory(req.Body)
803
	if berr != nil {
804
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
805
	}
806
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
807
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
808
	}
809
810
	var (
811
		val string
812
		ok  bool
813
		err error
814
		_   = err
815
	)
816
817
	val, ok = pathParams["tenant_id"]
818
	if !ok {
819
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
820
	}
821
822
	protoReq.TenantId, err = runtime.String(val)
823
	if err != nil {
824
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
825
	}
826
827
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
828
	return msg, metadata, err
829
830
}
831
832
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
833
	var protoReq RelationshipReadRequest
834
	var metadata runtime.ServerMetadata
835
836
	newReader, berr := utilities.IOReaderFactory(req.Body)
837
	if berr != nil {
838
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
839
	}
840
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
841
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
842
	}
843
844
	var (
845
		val string
846
		ok  bool
847
		err error
848
		_   = err
849
	)
850
851
	val, ok = pathParams["tenant_id"]
852
	if !ok {
853
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
854
	}
855
856
	protoReq.TenantId, err = runtime.String(val)
857
	if err != nil {
858
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
859
	}
860
861
	msg, err := server.ReadRelationships(ctx, &protoReq)
862
	return msg, metadata, err
863
864
}
865
866
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
867
	var protoReq AttributeReadRequest
868
	var metadata runtime.ServerMetadata
869
870
	newReader, berr := utilities.IOReaderFactory(req.Body)
871
	if berr != nil {
872
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
873
	}
874
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
875
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
876
	}
877
878
	var (
879
		val string
880
		ok  bool
881
		err error
882
		_   = err
883
	)
884
885
	val, ok = pathParams["tenant_id"]
886
	if !ok {
887
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
888
	}
889
890
	protoReq.TenantId, err = runtime.String(val)
891
	if err != nil {
892
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
893
	}
894
895
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
896
	return msg, metadata, err
897
898
}
899
900
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
901
	var protoReq AttributeReadRequest
902
	var metadata runtime.ServerMetadata
903
904
	newReader, berr := utilities.IOReaderFactory(req.Body)
905
	if berr != nil {
906
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
907
	}
908
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
909
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
910
	}
911
912
	var (
913
		val string
914
		ok  bool
915
		err error
916
		_   = err
917
	)
918
919
	val, ok = pathParams["tenant_id"]
920
	if !ok {
921
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
922
	}
923
924
	protoReq.TenantId, err = runtime.String(val)
925
	if err != nil {
926
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
927
	}
928
929
	msg, err := server.ReadAttributes(ctx, &protoReq)
930
	return msg, metadata, err
931
932
}
933
934
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
935
	var protoReq DataDeleteRequest
936
	var metadata runtime.ServerMetadata
937
938
	newReader, berr := utilities.IOReaderFactory(req.Body)
939
	if berr != nil {
940
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
941
	}
942
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
943
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
944
	}
945
946
	var (
947
		val string
948
		ok  bool
949
		err error
950
		_   = err
951
	)
952
953
	val, ok = pathParams["tenant_id"]
954
	if !ok {
955
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
956
	}
957
958
	protoReq.TenantId, err = runtime.String(val)
959
	if err != nil {
960
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
961
	}
962
963
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
964
	return msg, metadata, err
965
966
}
967
968
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
969
	var protoReq DataDeleteRequest
970
	var metadata runtime.ServerMetadata
971
972
	newReader, berr := utilities.IOReaderFactory(req.Body)
973
	if berr != nil {
974
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
975
	}
976
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
977
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
978
	}
979
980
	var (
981
		val string
982
		ok  bool
983
		err error
984
		_   = err
985
	)
986
987
	val, ok = pathParams["tenant_id"]
988
	if !ok {
989
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
990
	}
991
992
	protoReq.TenantId, err = runtime.String(val)
993
	if err != nil {
994
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
995
	}
996
997
	msg, err := server.Delete(ctx, &protoReq)
998
	return msg, metadata, err
999
1000
}
1001
1002
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1003
	var protoReq RelationshipDeleteRequest
1004
	var metadata runtime.ServerMetadata
1005
1006
	newReader, berr := utilities.IOReaderFactory(req.Body)
1007
	if berr != nil {
1008
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1009
	}
1010
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1011
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1012
	}
1013
1014
	var (
1015
		val string
1016
		ok  bool
1017
		err error
1018
		_   = err
1019
	)
1020
1021
	val, ok = pathParams["tenant_id"]
1022
	if !ok {
1023
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1024
	}
1025
1026
	protoReq.TenantId, err = runtime.String(val)
1027
	if err != nil {
1028
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1029
	}
1030
1031
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1032
	return msg, metadata, err
1033
1034
}
1035
1036
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1037
	var protoReq RelationshipDeleteRequest
1038
	var metadata runtime.ServerMetadata
1039
1040
	newReader, berr := utilities.IOReaderFactory(req.Body)
1041
	if berr != nil {
1042
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1043
	}
1044
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1045
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1046
	}
1047
1048
	var (
1049
		val string
1050
		ok  bool
1051
		err error
1052
		_   = err
1053
	)
1054
1055
	val, ok = pathParams["tenant_id"]
1056
	if !ok {
1057
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1058
	}
1059
1060
	protoReq.TenantId, err = runtime.String(val)
1061
	if err != nil {
1062
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1063
	}
1064
1065
	msg, err := server.DeleteRelationships(ctx, &protoReq)
1066
	return msg, metadata, err
1067
1068
}
1069
1070
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1071
	var protoReq BundleRunRequest
1072
	var metadata runtime.ServerMetadata
1073
1074
	newReader, berr := utilities.IOReaderFactory(req.Body)
1075
	if berr != nil {
1076
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1077
	}
1078
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1079
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1080
	}
1081
1082
	var (
1083
		val string
1084
		ok  bool
1085
		err error
1086
		_   = err
1087
	)
1088
1089
	val, ok = pathParams["tenant_id"]
1090
	if !ok {
1091
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1092
	}
1093
1094
	protoReq.TenantId, err = runtime.String(val)
1095
	if err != nil {
1096
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1097
	}
1098
1099
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1100
	return msg, metadata, err
1101
1102
}
1103
1104
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1105
	var protoReq BundleRunRequest
1106
	var metadata runtime.ServerMetadata
1107
1108
	newReader, berr := utilities.IOReaderFactory(req.Body)
1109
	if berr != nil {
1110
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1111
	}
1112
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1113
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1114
	}
1115
1116
	var (
1117
		val string
1118
		ok  bool
1119
		err error
1120
		_   = err
1121
	)
1122
1123
	val, ok = pathParams["tenant_id"]
1124
	if !ok {
1125
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1126
	}
1127
1128
	protoReq.TenantId, err = runtime.String(val)
1129
	if err != nil {
1130
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1131
	}
1132
1133
	msg, err := server.RunBundle(ctx, &protoReq)
1134
	return msg, metadata, err
1135
1136
}
1137
1138
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1139
	var protoReq BundleWriteRequest
1140
	var metadata runtime.ServerMetadata
1141
1142
	newReader, berr := utilities.IOReaderFactory(req.Body)
1143
	if berr != nil {
1144
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1145
	}
1146
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1147
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1148
	}
1149
1150
	var (
1151
		val string
1152
		ok  bool
1153
		err error
1154
		_   = err
1155
	)
1156
1157
	val, ok = pathParams["tenant_id"]
1158
	if !ok {
1159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1160
	}
1161
1162
	protoReq.TenantId, err = runtime.String(val)
1163
	if err != nil {
1164
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1165
	}
1166
1167
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1168
	return msg, metadata, err
1169
1170
}
1171
1172
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1173
	var protoReq BundleWriteRequest
1174
	var metadata runtime.ServerMetadata
1175
1176
	newReader, berr := utilities.IOReaderFactory(req.Body)
1177
	if berr != nil {
1178
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1179
	}
1180
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1181
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1182
	}
1183
1184
	var (
1185
		val string
1186
		ok  bool
1187
		err error
1188
		_   = err
1189
	)
1190
1191
	val, ok = pathParams["tenant_id"]
1192
	if !ok {
1193
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1194
	}
1195
1196
	protoReq.TenantId, err = runtime.String(val)
1197
	if err != nil {
1198
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1199
	}
1200
1201
	msg, err := server.Write(ctx, &protoReq)
1202
	return msg, metadata, err
1203
1204
}
1205
1206
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1207
	var protoReq BundleReadRequest
1208
	var metadata runtime.ServerMetadata
1209
1210
	newReader, berr := utilities.IOReaderFactory(req.Body)
1211
	if berr != nil {
1212
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1213
	}
1214
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1215
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1216
	}
1217
1218
	var (
1219
		val string
1220
		ok  bool
1221
		err error
1222
		_   = err
1223
	)
1224
1225
	val, ok = pathParams["tenant_id"]
1226
	if !ok {
1227
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1228
	}
1229
1230
	protoReq.TenantId, err = runtime.String(val)
1231
	if err != nil {
1232
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1233
	}
1234
1235
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1236
	return msg, metadata, err
1237
1238
}
1239
1240
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1241
	var protoReq BundleReadRequest
1242
	var metadata runtime.ServerMetadata
1243
1244
	newReader, berr := utilities.IOReaderFactory(req.Body)
1245
	if berr != nil {
1246
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1247
	}
1248
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1250
	}
1251
1252
	var (
1253
		val string
1254
		ok  bool
1255
		err error
1256
		_   = err
1257
	)
1258
1259
	val, ok = pathParams["tenant_id"]
1260
	if !ok {
1261
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1262
	}
1263
1264
	protoReq.TenantId, err = runtime.String(val)
1265
	if err != nil {
1266
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1267
	}
1268
1269
	msg, err := server.Read(ctx, &protoReq)
1270
	return msg, metadata, err
1271
1272
}
1273
1274
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1275
	var protoReq BundleDeleteRequest
1276
	var metadata runtime.ServerMetadata
1277
1278
	newReader, berr := utilities.IOReaderFactory(req.Body)
1279
	if berr != nil {
1280
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1281
	}
1282
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1283
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1284
	}
1285
1286
	var (
1287
		val string
1288
		ok  bool
1289
		err error
1290
		_   = err
1291
	)
1292
1293
	val, ok = pathParams["tenant_id"]
1294
	if !ok {
1295
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1296
	}
1297
1298
	protoReq.TenantId, err = runtime.String(val)
1299
	if err != nil {
1300
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1301
	}
1302
1303
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1304
	return msg, metadata, err
1305
1306
}
1307
1308
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1309
	var protoReq BundleDeleteRequest
1310
	var metadata runtime.ServerMetadata
1311
1312
	newReader, berr := utilities.IOReaderFactory(req.Body)
1313
	if berr != nil {
1314
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1315
	}
1316
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1317
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1318
	}
1319
1320
	var (
1321
		val string
1322
		ok  bool
1323
		err error
1324
		_   = err
1325
	)
1326
1327
	val, ok = pathParams["tenant_id"]
1328
	if !ok {
1329
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1330
	}
1331
1332
	protoReq.TenantId, err = runtime.String(val)
1333
	if err != nil {
1334
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1335
	}
1336
1337
	msg, err := server.Delete(ctx, &protoReq)
1338
	return msg, metadata, err
1339
1340
}
1341
1342
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1343
	var protoReq TenantCreateRequest
1344
	var metadata runtime.ServerMetadata
1345
1346
	newReader, berr := utilities.IOReaderFactory(req.Body)
1347
	if berr != nil {
1348
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1349
	}
1350
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1351
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1352
	}
1353
1354
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1355
	return msg, metadata, err
1356
1357
}
1358
1359
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1360
	var protoReq TenantCreateRequest
1361
	var metadata runtime.ServerMetadata
1362
1363
	newReader, berr := utilities.IOReaderFactory(req.Body)
1364
	if berr != nil {
1365
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1366
	}
1367
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1368
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1369
	}
1370
1371
	msg, err := server.Create(ctx, &protoReq)
1372
	return msg, metadata, err
1373
1374
}
1375
1376
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1377
	var protoReq TenantDeleteRequest
1378
	var metadata runtime.ServerMetadata
1379
1380
	var (
1381
		val string
1382
		ok  bool
1383
		err error
1384
		_   = err
1385
	)
1386
1387
	val, ok = pathParams["id"]
1388
	if !ok {
1389
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1390
	}
1391
1392
	protoReq.Id, err = runtime.String(val)
1393
	if err != nil {
1394
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1395
	}
1396
1397
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1398
	return msg, metadata, err
1399
1400
}
1401
1402
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1403
	var protoReq TenantDeleteRequest
1404
	var metadata runtime.ServerMetadata
1405
1406
	var (
1407
		val string
1408
		ok  bool
1409
		err error
1410
		_   = err
1411
	)
1412
1413
	val, ok = pathParams["id"]
1414
	if !ok {
1415
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1416
	}
1417
1418
	protoReq.Id, err = runtime.String(val)
1419
	if err != nil {
1420
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1421
	}
1422
1423
	msg, err := server.Delete(ctx, &protoReq)
1424
	return msg, metadata, err
1425
1426
}
1427
1428
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1429
	var protoReq TenantListRequest
1430
	var metadata runtime.ServerMetadata
1431
1432
	newReader, berr := utilities.IOReaderFactory(req.Body)
1433
	if berr != nil {
1434
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1435
	}
1436
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1437
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1438
	}
1439
1440
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1441
	return msg, metadata, err
1442
1443
}
1444
1445
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1446
	var protoReq TenantListRequest
1447
	var metadata runtime.ServerMetadata
1448
1449
	newReader, berr := utilities.IOReaderFactory(req.Body)
1450
	if berr != nil {
1451
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1452
	}
1453
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1454
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1455
	}
1456
1457
	msg, err := server.List(ctx, &protoReq)
1458
	return msg, metadata, err
1459
1460
}
1461
1462
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1463
// UnaryRPC     :call PermissionServer directly.
1464
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1465
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1466
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1467
1468
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1469
		ctx, cancel := context.WithCancel(req.Context())
1470
		defer cancel()
1471
		var stream runtime.ServerTransportStream
1472
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1473
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1474
		var err error
1475
		var annotatedContext context.Context
1476
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1477
		if err != nil {
1478
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1479
			return
1480
		}
1481
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1482
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1483
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1484
		if err != nil {
1485
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1486
			return
1487
		}
1488
1489
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1490
1491
	})
1492
1493
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1494
		ctx, cancel := context.WithCancel(req.Context())
1495
		defer cancel()
1496
		var stream runtime.ServerTransportStream
1497
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1498
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1499
		var err error
1500
		var annotatedContext context.Context
1501
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1502
		if err != nil {
1503
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1504
			return
1505
		}
1506
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1507
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1508
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1509
		if err != nil {
1510
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1511
			return
1512
		}
1513
1514
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1515
1516
	})
1517
1518
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1519
		ctx, cancel := context.WithCancel(req.Context())
1520
		defer cancel()
1521
		var stream runtime.ServerTransportStream
1522
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1523
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1524
		var err error
1525
		var annotatedContext context.Context
1526
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1527
		if err != nil {
1528
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1529
			return
1530
		}
1531
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1532
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1533
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1534
		if err != nil {
1535
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1536
			return
1537
		}
1538
1539
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1540
1541
	})
1542
1543
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1544
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1545
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1546
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1547
		return
1548
	})
1549
1550
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1551
		ctx, cancel := context.WithCancel(req.Context())
1552
		defer cancel()
1553
		var stream runtime.ServerTransportStream
1554
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1555
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1556
		var err error
1557
		var annotatedContext context.Context
1558
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1559
		if err != nil {
1560
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1561
			return
1562
		}
1563
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1564
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1565
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1566
		if err != nil {
1567
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1568
			return
1569
		}
1570
1571
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1572
1573
	})
1574
1575
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1576
		ctx, cancel := context.WithCancel(req.Context())
1577
		defer cancel()
1578
		var stream runtime.ServerTransportStream
1579
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1580
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1581
		var err error
1582
		var annotatedContext context.Context
1583
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1584
		if err != nil {
1585
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1586
			return
1587
		}
1588
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1589
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1590
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1591
		if err != nil {
1592
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1593
			return
1594
		}
1595
1596
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1597
1598
	})
1599
1600
	return nil
1601
}
1602
1603
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1604
// UnaryRPC     :call WatchServer directly.
1605
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1606
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1607
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1608
1609
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1610
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1611
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1612
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1613
		return
1614
	})
1615
1616
	return nil
1617
}
1618
1619
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1620
// UnaryRPC     :call SchemaServer directly.
1621
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1622
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1623
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1624
1625
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1626
		ctx, cancel := context.WithCancel(req.Context())
1627
		defer cancel()
1628
		var stream runtime.ServerTransportStream
1629
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1630
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1631
		var err error
1632
		var annotatedContext context.Context
1633
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1634
		if err != nil {
1635
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1636
			return
1637
		}
1638
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1639
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1640
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1641
		if err != nil {
1642
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1643
			return
1644
		}
1645
1646
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1647
1648
	})
1649
1650
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1651
		ctx, cancel := context.WithCancel(req.Context())
1652
		defer cancel()
1653
		var stream runtime.ServerTransportStream
1654
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1655
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1656
		var err error
1657
		var annotatedContext context.Context
1658
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1659
		if err != nil {
1660
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1661
			return
1662
		}
1663
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1664
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1665
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1666
		if err != nil {
1667
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1668
			return
1669
		}
1670
1671
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1672
1673
	})
1674
1675
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1676
		ctx, cancel := context.WithCancel(req.Context())
1677
		defer cancel()
1678
		var stream runtime.ServerTransportStream
1679
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1680
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1681
		var err error
1682
		var annotatedContext context.Context
1683
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
1684
		if err != nil {
1685
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1686
			return
1687
		}
1688
		resp, md, err := local_request_Schema_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1689
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1690
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1691
		if err != nil {
1692
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1693
			return
1694
		}
1695
1696
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1697
1698
	})
1699
1700
	return nil
1701
}
1702
1703
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1704
// UnaryRPC     :call DataServer directly.
1705
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1706
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1707
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1708
1709
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1710
		ctx, cancel := context.WithCancel(req.Context())
1711
		defer cancel()
1712
		var stream runtime.ServerTransportStream
1713
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1714
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1715
		var err error
1716
		var annotatedContext context.Context
1717
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1718
		if err != nil {
1719
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1720
			return
1721
		}
1722
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1723
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1724
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1725
		if err != nil {
1726
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1727
			return
1728
		}
1729
1730
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1731
1732
	})
1733
1734
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1735
		ctx, cancel := context.WithCancel(req.Context())
1736
		defer cancel()
1737
		var stream runtime.ServerTransportStream
1738
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1739
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1740
		var err error
1741
		var annotatedContext context.Context
1742
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1743
		if err != nil {
1744
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1745
			return
1746
		}
1747
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1748
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1749
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1750
		if err != nil {
1751
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1752
			return
1753
		}
1754
1755
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1756
1757
	})
1758
1759
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1760
		ctx, cancel := context.WithCancel(req.Context())
1761
		defer cancel()
1762
		var stream runtime.ServerTransportStream
1763
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1764
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1765
		var err error
1766
		var annotatedContext context.Context
1767
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1768
		if err != nil {
1769
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1770
			return
1771
		}
1772
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1773
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1774
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1775
		if err != nil {
1776
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1777
			return
1778
		}
1779
1780
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1781
1782
	})
1783
1784
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1785
		ctx, cancel := context.WithCancel(req.Context())
1786
		defer cancel()
1787
		var stream runtime.ServerTransportStream
1788
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1789
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1790
		var err error
1791
		var annotatedContext context.Context
1792
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1793
		if err != nil {
1794
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1795
			return
1796
		}
1797
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1798
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1799
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1800
		if err != nil {
1801
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1802
			return
1803
		}
1804
1805
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1806
1807
	})
1808
1809
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1810
		ctx, cancel := context.WithCancel(req.Context())
1811
		defer cancel()
1812
		var stream runtime.ServerTransportStream
1813
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1814
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1815
		var err error
1816
		var annotatedContext context.Context
1817
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1818
		if err != nil {
1819
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1820
			return
1821
		}
1822
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1823
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1824
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1825
		if err != nil {
1826
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1827
			return
1828
		}
1829
1830
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1831
1832
	})
1833
1834
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1835
		ctx, cancel := context.WithCancel(req.Context())
1836
		defer cancel()
1837
		var stream runtime.ServerTransportStream
1838
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1839
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1840
		var err error
1841
		var annotatedContext context.Context
1842
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1843
		if err != nil {
1844
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1845
			return
1846
		}
1847
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1848
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1849
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1850
		if err != nil {
1851
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1852
			return
1853
		}
1854
1855
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1856
1857
	})
1858
1859
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1860
		ctx, cancel := context.WithCancel(req.Context())
1861
		defer cancel()
1862
		var stream runtime.ServerTransportStream
1863
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1864
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1865
		var err error
1866
		var annotatedContext context.Context
1867
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1868
		if err != nil {
1869
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1870
			return
1871
		}
1872
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1873
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1874
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1875
		if err != nil {
1876
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1877
			return
1878
		}
1879
1880
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1881
1882
	})
1883
1884
	return nil
1885
}
1886
1887
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1888
// UnaryRPC     :call BundleServer directly.
1889
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1890
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1891
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1892
1893
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1894
		ctx, cancel := context.WithCancel(req.Context())
1895
		defer cancel()
1896
		var stream runtime.ServerTransportStream
1897
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1898
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1899
		var err error
1900
		var annotatedContext context.Context
1901
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1902
		if err != nil {
1903
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1904
			return
1905
		}
1906
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1907
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1908
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1909
		if err != nil {
1910
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1911
			return
1912
		}
1913
1914
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1915
1916
	})
1917
1918
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1919
		ctx, cancel := context.WithCancel(req.Context())
1920
		defer cancel()
1921
		var stream runtime.ServerTransportStream
1922
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1923
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1924
		var err error
1925
		var annotatedContext context.Context
1926
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
1927
		if err != nil {
1928
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1929
			return
1930
		}
1931
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1932
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1933
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1934
		if err != nil {
1935
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1936
			return
1937
		}
1938
1939
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1940
1941
	})
1942
1943
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1944
		ctx, cancel := context.WithCancel(req.Context())
1945
		defer cancel()
1946
		var stream runtime.ServerTransportStream
1947
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1948
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1949
		var err error
1950
		var annotatedContext context.Context
1951
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
1952
		if err != nil {
1953
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1954
			return
1955
		}
1956
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1957
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1958
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1959
		if err != nil {
1960
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1961
			return
1962
		}
1963
1964
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1965
1966
	})
1967
1968
	return nil
1969
}
1970
1971
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
1972
// UnaryRPC     :call TenancyServer directly.
1973
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1974
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
1975
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
1976
1977
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1978
		ctx, cancel := context.WithCancel(req.Context())
1979
		defer cancel()
1980
		var stream runtime.ServerTransportStream
1981
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1982
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1983
		var err error
1984
		var annotatedContext context.Context
1985
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
1986
		if err != nil {
1987
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1988
			return
1989
		}
1990
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1991
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1992
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1993
		if err != nil {
1994
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1995
			return
1996
		}
1997
1998
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1999
2000
	})
2001
2002
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2003
		ctx, cancel := context.WithCancel(req.Context())
2004
		defer cancel()
2005
		var stream runtime.ServerTransportStream
2006
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2007
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2008
		var err error
2009
		var annotatedContext context.Context
2010
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2011
		if err != nil {
2012
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2013
			return
2014
		}
2015
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2016
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2017
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2018
		if err != nil {
2019
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2020
			return
2021
		}
2022
2023
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2024
2025
	})
2026
2027
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2028
		ctx, cancel := context.WithCancel(req.Context())
2029
		defer cancel()
2030
		var stream runtime.ServerTransportStream
2031
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2032
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2033
		var err error
2034
		var annotatedContext context.Context
2035
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2036
		if err != nil {
2037
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2038
			return
2039
		}
2040
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2041
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2042
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2043
		if err != nil {
2044
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2045
			return
2046
		}
2047
2048
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2049
2050
	})
2051
2052
	return nil
2053
}
2054
2055
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
2056
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2057
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2058
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2059
	if err != nil {
2060
		return err
2061
	}
2062
	defer func() {
2063
		if err != nil {
2064
			if cerr := conn.Close(); cerr != nil {
2065
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2066
			}
2067
			return
2068
		}
2069
		go func() {
2070
			<-ctx.Done()
2071
			if cerr := conn.Close(); cerr != nil {
2072
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2073
			}
2074
		}()
2075
	}()
2076
2077
	return RegisterPermissionHandler(ctx, mux, conn)
2078
}
2079
2080
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
2081
// The handlers forward requests to the grpc endpoint over "conn".
2082
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2083
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
2084
}
2085
2086
// RegisterPermissionHandlerClient registers the http handlers for service Permission
2087
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
2088
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
2089
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2090
// "PermissionClient" to call the correct interceptors.
2091
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
2092
2093
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2094
		ctx, cancel := context.WithCancel(req.Context())
2095
		defer cancel()
2096
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2097
		var err error
2098
		var annotatedContext context.Context
2099
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2100
		if err != nil {
2101
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2102
			return
2103
		}
2104
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2105
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2106
		if err != nil {
2107
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2108
			return
2109
		}
2110
2111
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2112
2113
	})
2114
2115
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2116
		ctx, cancel := context.WithCancel(req.Context())
2117
		defer cancel()
2118
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2119
		var err error
2120
		var annotatedContext context.Context
2121
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2122
		if err != nil {
2123
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2124
			return
2125
		}
2126
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2127
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2128
		if err != nil {
2129
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2130
			return
2131
		}
2132
2133
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2134
2135
	})
2136
2137
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2138
		ctx, cancel := context.WithCancel(req.Context())
2139
		defer cancel()
2140
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2141
		var err error
2142
		var annotatedContext context.Context
2143
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2144
		if err != nil {
2145
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2146
			return
2147
		}
2148
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2149
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2150
		if err != nil {
2151
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2152
			return
2153
		}
2154
2155
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2156
2157
	})
2158
2159
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2160
		ctx, cancel := context.WithCancel(req.Context())
2161
		defer cancel()
2162
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2163
		var err error
2164
		var annotatedContext context.Context
2165
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2166
		if err != nil {
2167
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2168
			return
2169
		}
2170
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2171
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2172
		if err != nil {
2173
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2174
			return
2175
		}
2176
2177
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2178
2179
	})
2180
2181
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2182
		ctx, cancel := context.WithCancel(req.Context())
2183
		defer cancel()
2184
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2185
		var err error
2186
		var annotatedContext context.Context
2187
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2188
		if err != nil {
2189
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2190
			return
2191
		}
2192
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2193
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2194
		if err != nil {
2195
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2196
			return
2197
		}
2198
2199
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2200
2201
	})
2202
2203
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2204
		ctx, cancel := context.WithCancel(req.Context())
2205
		defer cancel()
2206
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2207
		var err error
2208
		var annotatedContext context.Context
2209
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2210
		if err != nil {
2211
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2212
			return
2213
		}
2214
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2215
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2216
		if err != nil {
2217
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2218
			return
2219
		}
2220
2221
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2222
2223
	})
2224
2225
	return nil
2226
}
2227
2228
var (
2229
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2230
2231
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2232
2233
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2234
2235
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2236
2237
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2238
2239
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2240
)
2241
2242
var (
2243
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2244
2245
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2246
2247
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2248
2249
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2250
2251
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2252
2253
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2254
)
2255
2256
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2257
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2258
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2259
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2260
	if err != nil {
2261
		return err
2262
	}
2263
	defer func() {
2264
		if err != nil {
2265
			if cerr := conn.Close(); cerr != nil {
2266
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2267
			}
2268
			return
2269
		}
2270
		go func() {
2271
			<-ctx.Done()
2272
			if cerr := conn.Close(); cerr != nil {
2273
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2274
			}
2275
		}()
2276
	}()
2277
2278
	return RegisterWatchHandler(ctx, mux, conn)
2279
}
2280
2281
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2282
// The handlers forward requests to the grpc endpoint over "conn".
2283
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2284
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2285
}
2286
2287
// RegisterWatchHandlerClient registers the http handlers for service Watch
2288
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2289
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2290
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2291
// "WatchClient" to call the correct interceptors.
2292
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2293
2294
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2295
		ctx, cancel := context.WithCancel(req.Context())
2296
		defer cancel()
2297
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2298
		var err error
2299
		var annotatedContext context.Context
2300
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2301
		if err != nil {
2302
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2303
			return
2304
		}
2305
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2306
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2307
		if err != nil {
2308
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2309
			return
2310
		}
2311
2312
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2313
2314
	})
2315
2316
	return nil
2317
}
2318
2319
var (
2320
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2321
)
2322
2323
var (
2324
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2325
)
2326
2327
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2328
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2329
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2330
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2331
	if err != nil {
2332
		return err
2333
	}
2334
	defer func() {
2335
		if err != nil {
2336
			if cerr := conn.Close(); cerr != nil {
2337
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2338
			}
2339
			return
2340
		}
2341
		go func() {
2342
			<-ctx.Done()
2343
			if cerr := conn.Close(); cerr != nil {
2344
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2345
			}
2346
		}()
2347
	}()
2348
2349
	return RegisterSchemaHandler(ctx, mux, conn)
2350
}
2351
2352
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2353
// The handlers forward requests to the grpc endpoint over "conn".
2354
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2355
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2356
}
2357
2358
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2359
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2360
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2361
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2362
// "SchemaClient" to call the correct interceptors.
2363
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2364
2365
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2366
		ctx, cancel := context.WithCancel(req.Context())
2367
		defer cancel()
2368
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2369
		var err error
2370
		var annotatedContext context.Context
2371
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2372
		if err != nil {
2373
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2374
			return
2375
		}
2376
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2377
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2378
		if err != nil {
2379
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2380
			return
2381
		}
2382
2383
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2384
2385
	})
2386
2387
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2388
		ctx, cancel := context.WithCancel(req.Context())
2389
		defer cancel()
2390
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2391
		var err error
2392
		var annotatedContext context.Context
2393
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2394
		if err != nil {
2395
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2396
			return
2397
		}
2398
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2399
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2400
		if err != nil {
2401
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2402
			return
2403
		}
2404
2405
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2406
2407
	})
2408
2409
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2410
		ctx, cancel := context.WithCancel(req.Context())
2411
		defer cancel()
2412
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2413
		var err error
2414
		var annotatedContext context.Context
2415
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
2416
		if err != nil {
2417
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2418
			return
2419
		}
2420
		resp, md, err := request_Schema_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2421
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2422
		if err != nil {
2423
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2424
			return
2425
		}
2426
2427
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2428
2429
	})
2430
2431
	return nil
2432
}
2433
2434
var (
2435
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2436
2437
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2438
2439
	pattern_Schema_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "list"}, ""))
2440
)
2441
2442
var (
2443
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2444
2445
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2446
2447
	forward_Schema_List_0 = runtime.ForwardResponseMessage
2448
)
2449
2450
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2451
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2452
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2453
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2454
	if err != nil {
2455
		return err
2456
	}
2457
	defer func() {
2458
		if err != nil {
2459
			if cerr := conn.Close(); cerr != nil {
2460
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2461
			}
2462
			return
2463
		}
2464
		go func() {
2465
			<-ctx.Done()
2466
			if cerr := conn.Close(); cerr != nil {
2467
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2468
			}
2469
		}()
2470
	}()
2471
2472
	return RegisterDataHandler(ctx, mux, conn)
2473
}
2474
2475
// RegisterDataHandler registers the http handlers for service Data to "mux".
2476
// The handlers forward requests to the grpc endpoint over "conn".
2477
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2478
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2479
}
2480
2481
// RegisterDataHandlerClient registers the http handlers for service Data
2482
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2483
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2484
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2485
// "DataClient" to call the correct interceptors.
2486
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2487
2488
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2489
		ctx, cancel := context.WithCancel(req.Context())
2490
		defer cancel()
2491
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2492
		var err error
2493
		var annotatedContext context.Context
2494
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2495
		if err != nil {
2496
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2497
			return
2498
		}
2499
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2500
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2501
		if err != nil {
2502
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2503
			return
2504
		}
2505
2506
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2507
2508
	})
2509
2510
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2511
		ctx, cancel := context.WithCancel(req.Context())
2512
		defer cancel()
2513
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2514
		var err error
2515
		var annotatedContext context.Context
2516
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2517
		if err != nil {
2518
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2519
			return
2520
		}
2521
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2522
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2523
		if err != nil {
2524
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2525
			return
2526
		}
2527
2528
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2529
2530
	})
2531
2532
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2533
		ctx, cancel := context.WithCancel(req.Context())
2534
		defer cancel()
2535
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2536
		var err error
2537
		var annotatedContext context.Context
2538
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2539
		if err != nil {
2540
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2541
			return
2542
		}
2543
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2544
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2545
		if err != nil {
2546
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2547
			return
2548
		}
2549
2550
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2551
2552
	})
2553
2554
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2555
		ctx, cancel := context.WithCancel(req.Context())
2556
		defer cancel()
2557
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2558
		var err error
2559
		var annotatedContext context.Context
2560
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2561
		if err != nil {
2562
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2563
			return
2564
		}
2565
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2566
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2567
		if err != nil {
2568
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2569
			return
2570
		}
2571
2572
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2573
2574
	})
2575
2576
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2577
		ctx, cancel := context.WithCancel(req.Context())
2578
		defer cancel()
2579
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2580
		var err error
2581
		var annotatedContext context.Context
2582
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2583
		if err != nil {
2584
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2585
			return
2586
		}
2587
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2588
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2589
		if err != nil {
2590
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2591
			return
2592
		}
2593
2594
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2595
2596
	})
2597
2598
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2599
		ctx, cancel := context.WithCancel(req.Context())
2600
		defer cancel()
2601
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2602
		var err error
2603
		var annotatedContext context.Context
2604
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2605
		if err != nil {
2606
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2607
			return
2608
		}
2609
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2610
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2611
		if err != nil {
2612
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2613
			return
2614
		}
2615
2616
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2617
2618
	})
2619
2620
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2621
		ctx, cancel := context.WithCancel(req.Context())
2622
		defer cancel()
2623
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2624
		var err error
2625
		var annotatedContext context.Context
2626
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2627
		if err != nil {
2628
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2629
			return
2630
		}
2631
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2632
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2633
		if err != nil {
2634
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2635
			return
2636
		}
2637
2638
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2639
2640
	})
2641
2642
	return nil
2643
}
2644
2645
var (
2646
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2647
2648
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2649
2650
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2651
2652
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2653
2654
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2655
2656
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2657
2658
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2659
)
2660
2661
var (
2662
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2663
2664
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2665
2666
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2667
2668
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2669
2670
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2671
2672
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2673
2674
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2675
)
2676
2677
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2678
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2679
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2680
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2681
	if err != nil {
2682
		return err
2683
	}
2684
	defer func() {
2685
		if err != nil {
2686
			if cerr := conn.Close(); cerr != nil {
2687
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2688
			}
2689
			return
2690
		}
2691
		go func() {
2692
			<-ctx.Done()
2693
			if cerr := conn.Close(); cerr != nil {
2694
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2695
			}
2696
		}()
2697
	}()
2698
2699
	return RegisterBundleHandler(ctx, mux, conn)
2700
}
2701
2702
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2703
// The handlers forward requests to the grpc endpoint over "conn".
2704
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2705
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2706
}
2707
2708
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2709
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2710
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2711
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2712
// "BundleClient" to call the correct interceptors.
2713
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2714
2715
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2716
		ctx, cancel := context.WithCancel(req.Context())
2717
		defer cancel()
2718
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2719
		var err error
2720
		var annotatedContext context.Context
2721
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2722
		if err != nil {
2723
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2724
			return
2725
		}
2726
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2727
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2728
		if err != nil {
2729
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2730
			return
2731
		}
2732
2733
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2734
2735
	})
2736
2737
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2738
		ctx, cancel := context.WithCancel(req.Context())
2739
		defer cancel()
2740
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2741
		var err error
2742
		var annotatedContext context.Context
2743
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2744
		if err != nil {
2745
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2746
			return
2747
		}
2748
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2749
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2750
		if err != nil {
2751
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2752
			return
2753
		}
2754
2755
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2756
2757
	})
2758
2759
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2760
		ctx, cancel := context.WithCancel(req.Context())
2761
		defer cancel()
2762
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2763
		var err error
2764
		var annotatedContext context.Context
2765
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2766
		if err != nil {
2767
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2768
			return
2769
		}
2770
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2771
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2772
		if err != nil {
2773
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2774
			return
2775
		}
2776
2777
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2778
2779
	})
2780
2781
	return nil
2782
}
2783
2784
var (
2785
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2786
2787
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2788
2789
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2790
)
2791
2792
var (
2793
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2794
2795
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2796
2797
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2798
)
2799
2800
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2801
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2802
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2803
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2804
	if err != nil {
2805
		return err
2806
	}
2807
	defer func() {
2808
		if err != nil {
2809
			if cerr := conn.Close(); cerr != nil {
2810
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2811
			}
2812
			return
2813
		}
2814
		go func() {
2815
			<-ctx.Done()
2816
			if cerr := conn.Close(); cerr != nil {
2817
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2818
			}
2819
		}()
2820
	}()
2821
2822
	return RegisterTenancyHandler(ctx, mux, conn)
2823
}
2824
2825
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2826
// The handlers forward requests to the grpc endpoint over "conn".
2827
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2828
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2829
}
2830
2831
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2832
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2833
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2834
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2835
// "TenancyClient" to call the correct interceptors.
2836
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2837
2838
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2839
		ctx, cancel := context.WithCancel(req.Context())
2840
		defer cancel()
2841
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2842
		var err error
2843
		var annotatedContext context.Context
2844
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2845
		if err != nil {
2846
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2847
			return
2848
		}
2849
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2850
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2851
		if err != nil {
2852
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2853
			return
2854
		}
2855
2856
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2857
2858
	})
2859
2860
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2861
		ctx, cancel := context.WithCancel(req.Context())
2862
		defer cancel()
2863
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2864
		var err error
2865
		var annotatedContext context.Context
2866
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2867
		if err != nil {
2868
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2869
			return
2870
		}
2871
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2872
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2873
		if err != nil {
2874
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2875
			return
2876
		}
2877
2878
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2879
2880
	})
2881
2882
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2883
		ctx, cancel := context.WithCancel(req.Context())
2884
		defer cancel()
2885
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2886
		var err error
2887
		var annotatedContext context.Context
2888
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2889
		if err != nil {
2890
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2891
			return
2892
		}
2893
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2894
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2895
		if err != nil {
2896
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2897
			return
2898
		}
2899
2900
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2901
2902
	})
2903
2904
	return nil
2905
}
2906
2907
var (
2908
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
2909
2910
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
2911
2912
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
2913
)
2914
2915
var (
2916
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
2917
2918
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
2919
2920
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
2921
)
2922