Passed
Push — master ( 2d3f7e...154da4 )
by Tolga
01:14 queued 13s
created

basev1.local_request_Bundle_Delete_0   B

Complexity

Conditions 6

Size

Total Lines 31
Code Lines 21

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 6
eloc 21
nop 5
dl 0
loc 31
rs 8.4426
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq PermissionCheckRequest
36
	var metadata runtime.ServerMetadata
37
38
	newReader, berr := utilities.IOReaderFactory(req.Body)
39
	if berr != nil {
40
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
41
	}
42
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
43
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
44
	}
45
46
	var (
47
		val string
48
		ok  bool
49
		err error
50
		_   = err
51
	)
52
53
	val, ok = pathParams["tenant_id"]
54
	if !ok {
55
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
56
	}
57
58
	protoReq.TenantId, err = runtime.String(val)
59
	if err != nil {
60
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
61
	}
62
63
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
64
	return msg, metadata, err
65
66
}
67
68
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
69
	var protoReq PermissionCheckRequest
70
	var metadata runtime.ServerMetadata
71
72
	newReader, berr := utilities.IOReaderFactory(req.Body)
73
	if berr != nil {
74
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
75
	}
76
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
77
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
78
	}
79
80
	var (
81
		val string
82
		ok  bool
83
		err error
84
		_   = err
85
	)
86
87
	val, ok = pathParams["tenant_id"]
88
	if !ok {
89
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
90
	}
91
92
	protoReq.TenantId, err = runtime.String(val)
93
	if err != nil {
94
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
95
	}
96
97
	msg, err := server.Check(ctx, &protoReq)
98
	return msg, metadata, err
99
100
}
101
102
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
103
	var protoReq PermissionExpandRequest
104
	var metadata runtime.ServerMetadata
105
106
	newReader, berr := utilities.IOReaderFactory(req.Body)
107
	if berr != nil {
108
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
109
	}
110
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
111
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
112
	}
113
114
	var (
115
		val string
116
		ok  bool
117
		err error
118
		_   = err
119
	)
120
121
	val, ok = pathParams["tenant_id"]
122
	if !ok {
123
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
124
	}
125
126
	protoReq.TenantId, err = runtime.String(val)
127
	if err != nil {
128
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
129
	}
130
131
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
132
	return msg, metadata, err
133
134
}
135
136
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
137
	var protoReq PermissionExpandRequest
138
	var metadata runtime.ServerMetadata
139
140
	newReader, berr := utilities.IOReaderFactory(req.Body)
141
	if berr != nil {
142
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
143
	}
144
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
145
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
146
	}
147
148
	var (
149
		val string
150
		ok  bool
151
		err error
152
		_   = err
153
	)
154
155
	val, ok = pathParams["tenant_id"]
156
	if !ok {
157
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
158
	}
159
160
	protoReq.TenantId, err = runtime.String(val)
161
	if err != nil {
162
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
163
	}
164
165
	msg, err := server.Expand(ctx, &protoReq)
166
	return msg, metadata, err
167
168
}
169
170
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
171
	var protoReq PermissionLookupEntityRequest
172
	var metadata runtime.ServerMetadata
173
174
	newReader, berr := utilities.IOReaderFactory(req.Body)
175
	if berr != nil {
176
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
177
	}
178
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
179
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
180
	}
181
182
	var (
183
		val string
184
		ok  bool
185
		err error
186
		_   = err
187
	)
188
189
	val, ok = pathParams["tenant_id"]
190
	if !ok {
191
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
192
	}
193
194
	protoReq.TenantId, err = runtime.String(val)
195
	if err != nil {
196
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
197
	}
198
199
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
200
	return msg, metadata, err
201
202
}
203
204
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
205
	var protoReq PermissionLookupEntityRequest
206
	var metadata runtime.ServerMetadata
207
208
	newReader, berr := utilities.IOReaderFactory(req.Body)
209
	if berr != nil {
210
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
211
	}
212
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
213
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
214
	}
215
216
	var (
217
		val string
218
		ok  bool
219
		err error
220
		_   = err
221
	)
222
223
	val, ok = pathParams["tenant_id"]
224
	if !ok {
225
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
226
	}
227
228
	protoReq.TenantId, err = runtime.String(val)
229
	if err != nil {
230
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
231
	}
232
233
	msg, err := server.LookupEntity(ctx, &protoReq)
234
	return msg, metadata, err
235
236
}
237
238
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
239
	var protoReq PermissionLookupEntityRequest
240
	var metadata runtime.ServerMetadata
241
242
	newReader, berr := utilities.IOReaderFactory(req.Body)
243
	if berr != nil {
244
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
245
	}
246
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
247
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
248
	}
249
250
	var (
251
		val string
252
		ok  bool
253
		err error
254
		_   = err
255
	)
256
257
	val, ok = pathParams["tenant_id"]
258
	if !ok {
259
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
260
	}
261
262
	protoReq.TenantId, err = runtime.String(val)
263
	if err != nil {
264
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
265
	}
266
267
	stream, err := client.LookupEntityStream(ctx, &protoReq)
268
	if err != nil {
269
		return nil, metadata, err
270
	}
271
	header, err := stream.Header()
272
	if err != nil {
273
		return nil, metadata, err
274
	}
275
	metadata.HeaderMD = header
276
	return stream, metadata, nil
277
278
}
279
280
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
281
	var protoReq PermissionLookupSubjectRequest
282
	var metadata runtime.ServerMetadata
283
284
	newReader, berr := utilities.IOReaderFactory(req.Body)
285
	if berr != nil {
286
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
287
	}
288
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
289
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
290
	}
291
292
	var (
293
		val string
294
		ok  bool
295
		err error
296
		_   = err
297
	)
298
299
	val, ok = pathParams["tenant_id"]
300
	if !ok {
301
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
302
	}
303
304
	protoReq.TenantId, err = runtime.String(val)
305
	if err != nil {
306
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
307
	}
308
309
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
310
	return msg, metadata, err
311
312
}
313
314
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
315
	var protoReq PermissionLookupSubjectRequest
316
	var metadata runtime.ServerMetadata
317
318
	newReader, berr := utilities.IOReaderFactory(req.Body)
319
	if berr != nil {
320
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
321
	}
322
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
323
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
324
	}
325
326
	var (
327
		val string
328
		ok  bool
329
		err error
330
		_   = err
331
	)
332
333
	val, ok = pathParams["tenant_id"]
334
	if !ok {
335
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
336
	}
337
338
	protoReq.TenantId, err = runtime.String(val)
339
	if err != nil {
340
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
341
	}
342
343
	msg, err := server.LookupSubject(ctx, &protoReq)
344
	return msg, metadata, err
345
346
}
347
348
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
349
	var protoReq PermissionSubjectPermissionRequest
350
	var metadata runtime.ServerMetadata
351
352
	newReader, berr := utilities.IOReaderFactory(req.Body)
353
	if berr != nil {
354
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
355
	}
356
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
357
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
358
	}
359
360
	var (
361
		val string
362
		ok  bool
363
		err error
364
		_   = err
365
	)
366
367
	val, ok = pathParams["tenant_id"]
368
	if !ok {
369
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
370
	}
371
372
	protoReq.TenantId, err = runtime.String(val)
373
	if err != nil {
374
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
375
	}
376
377
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
378
	return msg, metadata, err
379
380
}
381
382
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
383
	var protoReq PermissionSubjectPermissionRequest
384
	var metadata runtime.ServerMetadata
385
386
	newReader, berr := utilities.IOReaderFactory(req.Body)
387
	if berr != nil {
388
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
389
	}
390
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
391
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
392
	}
393
394
	var (
395
		val string
396
		ok  bool
397
		err error
398
		_   = err
399
	)
400
401
	val, ok = pathParams["tenant_id"]
402
	if !ok {
403
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
404
	}
405
406
	protoReq.TenantId, err = runtime.String(val)
407
	if err != nil {
408
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
409
	}
410
411
	msg, err := server.SubjectPermission(ctx, &protoReq)
412
	return msg, metadata, err
413
414
}
415
416
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
417
	var protoReq WatchRequest
418
	var metadata runtime.ServerMetadata
419
420
	newReader, berr := utilities.IOReaderFactory(req.Body)
421
	if berr != nil {
422
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
423
	}
424
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
425
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
426
	}
427
428
	var (
429
		val string
430
		ok  bool
431
		err error
432
		_   = err
433
	)
434
435
	val, ok = pathParams["tenant_id"]
436
	if !ok {
437
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
438
	}
439
440
	protoReq.TenantId, err = runtime.String(val)
441
	if err != nil {
442
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
443
	}
444
445
	stream, err := client.Watch(ctx, &protoReq)
446
	if err != nil {
447
		return nil, metadata, err
448
	}
449
	header, err := stream.Header()
450
	if err != nil {
451
		return nil, metadata, err
452
	}
453
	metadata.HeaderMD = header
454
	return stream, metadata, nil
455
456
}
457
458
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
459
	var protoReq SchemaWriteRequest
460
	var metadata runtime.ServerMetadata
461
462
	newReader, berr := utilities.IOReaderFactory(req.Body)
463
	if berr != nil {
464
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
465
	}
466
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
467
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
468
	}
469
470
	var (
471
		val string
472
		ok  bool
473
		err error
474
		_   = err
475
	)
476
477
	val, ok = pathParams["tenant_id"]
478
	if !ok {
479
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
480
	}
481
482
	protoReq.TenantId, err = runtime.String(val)
483
	if err != nil {
484
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
485
	}
486
487
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
488
	return msg, metadata, err
489
490
}
491
492
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
493
	var protoReq SchemaWriteRequest
494
	var metadata runtime.ServerMetadata
495
496
	newReader, berr := utilities.IOReaderFactory(req.Body)
497
	if berr != nil {
498
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
499
	}
500
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
501
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
502
	}
503
504
	var (
505
		val string
506
		ok  bool
507
		err error
508
		_   = err
509
	)
510
511
	val, ok = pathParams["tenant_id"]
512
	if !ok {
513
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
514
	}
515
516
	protoReq.TenantId, err = runtime.String(val)
517
	if err != nil {
518
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
519
	}
520
521
	msg, err := server.Write(ctx, &protoReq)
522
	return msg, metadata, err
523
524
}
525
526
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
527
	var protoReq SchemaReadRequest
528
	var metadata runtime.ServerMetadata
529
530
	newReader, berr := utilities.IOReaderFactory(req.Body)
531
	if berr != nil {
532
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
533
	}
534
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
535
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
536
	}
537
538
	var (
539
		val string
540
		ok  bool
541
		err error
542
		_   = err
543
	)
544
545
	val, ok = pathParams["tenant_id"]
546
	if !ok {
547
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
548
	}
549
550
	protoReq.TenantId, err = runtime.String(val)
551
	if err != nil {
552
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
553
	}
554
555
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
556
	return msg, metadata, err
557
558
}
559
560
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
561
	var protoReq SchemaReadRequest
562
	var metadata runtime.ServerMetadata
563
564
	newReader, berr := utilities.IOReaderFactory(req.Body)
565
	if berr != nil {
566
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
567
	}
568
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
569
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
570
	}
571
572
	var (
573
		val string
574
		ok  bool
575
		err error
576
		_   = err
577
	)
578
579
	val, ok = pathParams["tenant_id"]
580
	if !ok {
581
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
582
	}
583
584
	protoReq.TenantId, err = runtime.String(val)
585
	if err != nil {
586
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
587
	}
588
589
	msg, err := server.Read(ctx, &protoReq)
590
	return msg, metadata, err
591
592
}
593
594
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
595
	var protoReq DataWriteRequest
596
	var metadata runtime.ServerMetadata
597
598
	newReader, berr := utilities.IOReaderFactory(req.Body)
599
	if berr != nil {
600
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
601
	}
602
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
603
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
604
	}
605
606
	var (
607
		val string
608
		ok  bool
609
		err error
610
		_   = err
611
	)
612
613
	val, ok = pathParams["tenant_id"]
614
	if !ok {
615
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
616
	}
617
618
	protoReq.TenantId, err = runtime.String(val)
619
	if err != nil {
620
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
621
	}
622
623
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
624
	return msg, metadata, err
625
626
}
627
628
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
629
	var protoReq DataWriteRequest
630
	var metadata runtime.ServerMetadata
631
632
	newReader, berr := utilities.IOReaderFactory(req.Body)
633
	if berr != nil {
634
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
635
	}
636
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
637
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
638
	}
639
640
	var (
641
		val string
642
		ok  bool
643
		err error
644
		_   = err
645
	)
646
647
	val, ok = pathParams["tenant_id"]
648
	if !ok {
649
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
650
	}
651
652
	protoReq.TenantId, err = runtime.String(val)
653
	if err != nil {
654
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
655
	}
656
657
	msg, err := server.Write(ctx, &protoReq)
658
	return msg, metadata, err
659
660
}
661
662
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
663
	var protoReq RelationshipWriteRequest
664
	var metadata runtime.ServerMetadata
665
666
	newReader, berr := utilities.IOReaderFactory(req.Body)
667
	if berr != nil {
668
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
669
	}
670
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
671
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
672
	}
673
674
	var (
675
		val string
676
		ok  bool
677
		err error
678
		_   = err
679
	)
680
681
	val, ok = pathParams["tenant_id"]
682
	if !ok {
683
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
684
	}
685
686
	protoReq.TenantId, err = runtime.String(val)
687
	if err != nil {
688
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
689
	}
690
691
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
692
	return msg, metadata, err
693
694
}
695
696
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
697
	var protoReq RelationshipWriteRequest
698
	var metadata runtime.ServerMetadata
699
700
	newReader, berr := utilities.IOReaderFactory(req.Body)
701
	if berr != nil {
702
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
703
	}
704
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
705
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
706
	}
707
708
	var (
709
		val string
710
		ok  bool
711
		err error
712
		_   = err
713
	)
714
715
	val, ok = pathParams["tenant_id"]
716
	if !ok {
717
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
718
	}
719
720
	protoReq.TenantId, err = runtime.String(val)
721
	if err != nil {
722
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
723
	}
724
725
	msg, err := server.WriteRelationships(ctx, &protoReq)
726
	return msg, metadata, err
727
728
}
729
730
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
731
	var protoReq RelationshipReadRequest
732
	var metadata runtime.ServerMetadata
733
734
	newReader, berr := utilities.IOReaderFactory(req.Body)
735
	if berr != nil {
736
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
737
	}
738
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
739
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
740
	}
741
742
	var (
743
		val string
744
		ok  bool
745
		err error
746
		_   = err
747
	)
748
749
	val, ok = pathParams["tenant_id"]
750
	if !ok {
751
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
752
	}
753
754
	protoReq.TenantId, err = runtime.String(val)
755
	if err != nil {
756
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
757
	}
758
759
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
760
	return msg, metadata, err
761
762
}
763
764
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
765
	var protoReq RelationshipReadRequest
766
	var metadata runtime.ServerMetadata
767
768
	newReader, berr := utilities.IOReaderFactory(req.Body)
769
	if berr != nil {
770
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
771
	}
772
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
773
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
774
	}
775
776
	var (
777
		val string
778
		ok  bool
779
		err error
780
		_   = err
781
	)
782
783
	val, ok = pathParams["tenant_id"]
784
	if !ok {
785
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
786
	}
787
788
	protoReq.TenantId, err = runtime.String(val)
789
	if err != nil {
790
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
791
	}
792
793
	msg, err := server.ReadRelationships(ctx, &protoReq)
794
	return msg, metadata, err
795
796
}
797
798
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
799
	var protoReq AttributeReadRequest
800
	var metadata runtime.ServerMetadata
801
802
	newReader, berr := utilities.IOReaderFactory(req.Body)
803
	if berr != nil {
804
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
805
	}
806
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
807
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
808
	}
809
810
	var (
811
		val string
812
		ok  bool
813
		err error
814
		_   = err
815
	)
816
817
	val, ok = pathParams["tenant_id"]
818
	if !ok {
819
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
820
	}
821
822
	protoReq.TenantId, err = runtime.String(val)
823
	if err != nil {
824
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
825
	}
826
827
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
828
	return msg, metadata, err
829
830
}
831
832
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
833
	var protoReq AttributeReadRequest
834
	var metadata runtime.ServerMetadata
835
836
	newReader, berr := utilities.IOReaderFactory(req.Body)
837
	if berr != nil {
838
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
839
	}
840
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
841
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
842
	}
843
844
	var (
845
		val string
846
		ok  bool
847
		err error
848
		_   = err
849
	)
850
851
	val, ok = pathParams["tenant_id"]
852
	if !ok {
853
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
854
	}
855
856
	protoReq.TenantId, err = runtime.String(val)
857
	if err != nil {
858
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
859
	}
860
861
	msg, err := server.ReadAttributes(ctx, &protoReq)
862
	return msg, metadata, err
863
864
}
865
866
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
867
	var protoReq DataDeleteRequest
868
	var metadata runtime.ServerMetadata
869
870
	newReader, berr := utilities.IOReaderFactory(req.Body)
871
	if berr != nil {
872
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
873
	}
874
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
875
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
876
	}
877
878
	var (
879
		val string
880
		ok  bool
881
		err error
882
		_   = err
883
	)
884
885
	val, ok = pathParams["tenant_id"]
886
	if !ok {
887
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
888
	}
889
890
	protoReq.TenantId, err = runtime.String(val)
891
	if err != nil {
892
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
893
	}
894
895
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
896
	return msg, metadata, err
897
898
}
899
900
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
901
	var protoReq DataDeleteRequest
902
	var metadata runtime.ServerMetadata
903
904
	newReader, berr := utilities.IOReaderFactory(req.Body)
905
	if berr != nil {
906
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
907
	}
908
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
909
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
910
	}
911
912
	var (
913
		val string
914
		ok  bool
915
		err error
916
		_   = err
917
	)
918
919
	val, ok = pathParams["tenant_id"]
920
	if !ok {
921
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
922
	}
923
924
	protoReq.TenantId, err = runtime.String(val)
925
	if err != nil {
926
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
927
	}
928
929
	msg, err := server.Delete(ctx, &protoReq)
930
	return msg, metadata, err
931
932
}
933
934
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
935
	var protoReq RelationshipDeleteRequest
936
	var metadata runtime.ServerMetadata
937
938
	newReader, berr := utilities.IOReaderFactory(req.Body)
939
	if berr != nil {
940
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
941
	}
942
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
943
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
944
	}
945
946
	var (
947
		val string
948
		ok  bool
949
		err error
950
		_   = err
951
	)
952
953
	val, ok = pathParams["tenant_id"]
954
	if !ok {
955
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
956
	}
957
958
	protoReq.TenantId, err = runtime.String(val)
959
	if err != nil {
960
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
961
	}
962
963
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
964
	return msg, metadata, err
965
966
}
967
968
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
969
	var protoReq RelationshipDeleteRequest
970
	var metadata runtime.ServerMetadata
971
972
	newReader, berr := utilities.IOReaderFactory(req.Body)
973
	if berr != nil {
974
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
975
	}
976
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
977
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
978
	}
979
980
	var (
981
		val string
982
		ok  bool
983
		err error
984
		_   = err
985
	)
986
987
	val, ok = pathParams["tenant_id"]
988
	if !ok {
989
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
990
	}
991
992
	protoReq.TenantId, err = runtime.String(val)
993
	if err != nil {
994
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
995
	}
996
997
	msg, err := server.DeleteRelationships(ctx, &protoReq)
998
	return msg, metadata, err
999
1000
}
1001
1002
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1003
	var protoReq BundleRunRequest
1004
	var metadata runtime.ServerMetadata
1005
1006
	newReader, berr := utilities.IOReaderFactory(req.Body)
1007
	if berr != nil {
1008
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1009
	}
1010
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1011
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1012
	}
1013
1014
	var (
1015
		val string
1016
		ok  bool
1017
		err error
1018
		_   = err
1019
	)
1020
1021
	val, ok = pathParams["tenant_id"]
1022
	if !ok {
1023
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1024
	}
1025
1026
	protoReq.TenantId, err = runtime.String(val)
1027
	if err != nil {
1028
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1029
	}
1030
1031
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1032
	return msg, metadata, err
1033
1034
}
1035
1036
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1037
	var protoReq BundleRunRequest
1038
	var metadata runtime.ServerMetadata
1039
1040
	newReader, berr := utilities.IOReaderFactory(req.Body)
1041
	if berr != nil {
1042
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1043
	}
1044
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1045
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1046
	}
1047
1048
	var (
1049
		val string
1050
		ok  bool
1051
		err error
1052
		_   = err
1053
	)
1054
1055
	val, ok = pathParams["tenant_id"]
1056
	if !ok {
1057
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1058
	}
1059
1060
	protoReq.TenantId, err = runtime.String(val)
1061
	if err != nil {
1062
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1063
	}
1064
1065
	msg, err := server.RunBundle(ctx, &protoReq)
1066
	return msg, metadata, err
1067
1068
}
1069
1070
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1071
	var protoReq BundleWriteRequest
1072
	var metadata runtime.ServerMetadata
1073
1074
	newReader, berr := utilities.IOReaderFactory(req.Body)
1075
	if berr != nil {
1076
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1077
	}
1078
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1079
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1080
	}
1081
1082
	var (
1083
		val string
1084
		ok  bool
1085
		err error
1086
		_   = err
1087
	)
1088
1089
	val, ok = pathParams["tenant_id"]
1090
	if !ok {
1091
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1092
	}
1093
1094
	protoReq.TenantId, err = runtime.String(val)
1095
	if err != nil {
1096
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1097
	}
1098
1099
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1100
	return msg, metadata, err
1101
1102
}
1103
1104
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1105
	var protoReq BundleWriteRequest
1106
	var metadata runtime.ServerMetadata
1107
1108
	newReader, berr := utilities.IOReaderFactory(req.Body)
1109
	if berr != nil {
1110
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1111
	}
1112
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1113
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1114
	}
1115
1116
	var (
1117
		val string
1118
		ok  bool
1119
		err error
1120
		_   = err
1121
	)
1122
1123
	val, ok = pathParams["tenant_id"]
1124
	if !ok {
1125
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1126
	}
1127
1128
	protoReq.TenantId, err = runtime.String(val)
1129
	if err != nil {
1130
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1131
	}
1132
1133
	msg, err := server.Write(ctx, &protoReq)
1134
	return msg, metadata, err
1135
1136
}
1137
1138
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1139
	var protoReq BundleReadRequest
1140
	var metadata runtime.ServerMetadata
1141
1142
	newReader, berr := utilities.IOReaderFactory(req.Body)
1143
	if berr != nil {
1144
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1145
	}
1146
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1147
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1148
	}
1149
1150
	var (
1151
		val string
1152
		ok  bool
1153
		err error
1154
		_   = err
1155
	)
1156
1157
	val, ok = pathParams["tenant_id"]
1158
	if !ok {
1159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1160
	}
1161
1162
	protoReq.TenantId, err = runtime.String(val)
1163
	if err != nil {
1164
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1165
	}
1166
1167
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1168
	return msg, metadata, err
1169
1170
}
1171
1172
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1173
	var protoReq BundleReadRequest
1174
	var metadata runtime.ServerMetadata
1175
1176
	newReader, berr := utilities.IOReaderFactory(req.Body)
1177
	if berr != nil {
1178
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1179
	}
1180
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1181
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1182
	}
1183
1184
	var (
1185
		val string
1186
		ok  bool
1187
		err error
1188
		_   = err
1189
	)
1190
1191
	val, ok = pathParams["tenant_id"]
1192
	if !ok {
1193
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1194
	}
1195
1196
	protoReq.TenantId, err = runtime.String(val)
1197
	if err != nil {
1198
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1199
	}
1200
1201
	msg, err := server.Read(ctx, &protoReq)
1202
	return msg, metadata, err
1203
1204
}
1205
1206
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1207
	var protoReq BundleDeleteRequest
1208
	var metadata runtime.ServerMetadata
1209
1210
	newReader, berr := utilities.IOReaderFactory(req.Body)
1211
	if berr != nil {
1212
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1213
	}
1214
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1215
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1216
	}
1217
1218
	var (
1219
		val string
1220
		ok  bool
1221
		err error
1222
		_   = err
1223
	)
1224
1225
	val, ok = pathParams["tenant_id"]
1226
	if !ok {
1227
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1228
	}
1229
1230
	protoReq.TenantId, err = runtime.String(val)
1231
	if err != nil {
1232
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1233
	}
1234
1235
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1236
	return msg, metadata, err
1237
1238
}
1239
1240
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1241
	var protoReq BundleDeleteRequest
1242
	var metadata runtime.ServerMetadata
1243
1244
	newReader, berr := utilities.IOReaderFactory(req.Body)
1245
	if berr != nil {
1246
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1247
	}
1248
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1250
	}
1251
1252
	var (
1253
		val string
1254
		ok  bool
1255
		err error
1256
		_   = err
1257
	)
1258
1259
	val, ok = pathParams["tenant_id"]
1260
	if !ok {
1261
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1262
	}
1263
1264
	protoReq.TenantId, err = runtime.String(val)
1265
	if err != nil {
1266
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1267
	}
1268
1269
	msg, err := server.Delete(ctx, &protoReq)
1270
	return msg, metadata, err
1271
1272
}
1273
1274
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1275
	var protoReq TenantCreateRequest
1276
	var metadata runtime.ServerMetadata
1277
1278
	newReader, berr := utilities.IOReaderFactory(req.Body)
1279
	if berr != nil {
1280
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1281
	}
1282
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1283
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1284
	}
1285
1286
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1287
	return msg, metadata, err
1288
1289
}
1290
1291
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1292
	var protoReq TenantCreateRequest
1293
	var metadata runtime.ServerMetadata
1294
1295
	newReader, berr := utilities.IOReaderFactory(req.Body)
1296
	if berr != nil {
1297
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1298
	}
1299
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1300
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1301
	}
1302
1303
	msg, err := server.Create(ctx, &protoReq)
1304
	return msg, metadata, err
1305
1306
}
1307
1308
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1309
	var protoReq TenantDeleteRequest
1310
	var metadata runtime.ServerMetadata
1311
1312
	var (
1313
		val string
1314
		ok  bool
1315
		err error
1316
		_   = err
1317
	)
1318
1319
	val, ok = pathParams["id"]
1320
	if !ok {
1321
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1322
	}
1323
1324
	protoReq.Id, err = runtime.String(val)
1325
	if err != nil {
1326
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1327
	}
1328
1329
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1330
	return msg, metadata, err
1331
1332
}
1333
1334
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1335
	var protoReq TenantDeleteRequest
1336
	var metadata runtime.ServerMetadata
1337
1338
	var (
1339
		val string
1340
		ok  bool
1341
		err error
1342
		_   = err
1343
	)
1344
1345
	val, ok = pathParams["id"]
1346
	if !ok {
1347
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1348
	}
1349
1350
	protoReq.Id, err = runtime.String(val)
1351
	if err != nil {
1352
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1353
	}
1354
1355
	msg, err := server.Delete(ctx, &protoReq)
1356
	return msg, metadata, err
1357
1358
}
1359
1360
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1361
	var protoReq TenantListRequest
1362
	var metadata runtime.ServerMetadata
1363
1364
	newReader, berr := utilities.IOReaderFactory(req.Body)
1365
	if berr != nil {
1366
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1367
	}
1368
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1369
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1370
	}
1371
1372
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1373
	return msg, metadata, err
1374
1375
}
1376
1377
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1378
	var protoReq TenantListRequest
1379
	var metadata runtime.ServerMetadata
1380
1381
	newReader, berr := utilities.IOReaderFactory(req.Body)
1382
	if berr != nil {
1383
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1384
	}
1385
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1386
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1387
	}
1388
1389
	msg, err := server.List(ctx, &protoReq)
1390
	return msg, metadata, err
1391
1392
}
1393
1394
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1395
// UnaryRPC     :call PermissionServer directly.
1396
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1397
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1398
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1399
1400
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1401
		ctx, cancel := context.WithCancel(req.Context())
1402
		defer cancel()
1403
		var stream runtime.ServerTransportStream
1404
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1405
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1406
		var err error
1407
		var annotatedContext context.Context
1408
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1409
		if err != nil {
1410
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1411
			return
1412
		}
1413
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1414
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1415
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1416
		if err != nil {
1417
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1418
			return
1419
		}
1420
1421
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1422
1423
	})
1424
1425
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1426
		ctx, cancel := context.WithCancel(req.Context())
1427
		defer cancel()
1428
		var stream runtime.ServerTransportStream
1429
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1430
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1431
		var err error
1432
		var annotatedContext context.Context
1433
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1434
		if err != nil {
1435
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1436
			return
1437
		}
1438
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1439
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1440
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1441
		if err != nil {
1442
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1443
			return
1444
		}
1445
1446
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1447
1448
	})
1449
1450
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1451
		ctx, cancel := context.WithCancel(req.Context())
1452
		defer cancel()
1453
		var stream runtime.ServerTransportStream
1454
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1455
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1456
		var err error
1457
		var annotatedContext context.Context
1458
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1459
		if err != nil {
1460
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1461
			return
1462
		}
1463
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1464
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1465
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1466
		if err != nil {
1467
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1468
			return
1469
		}
1470
1471
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1472
1473
	})
1474
1475
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1476
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1477
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1478
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1479
		return
1480
	})
1481
1482
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1483
		ctx, cancel := context.WithCancel(req.Context())
1484
		defer cancel()
1485
		var stream runtime.ServerTransportStream
1486
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1487
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1488
		var err error
1489
		var annotatedContext context.Context
1490
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1491
		if err != nil {
1492
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1493
			return
1494
		}
1495
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1496
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1497
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1498
		if err != nil {
1499
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1500
			return
1501
		}
1502
1503
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1504
1505
	})
1506
1507
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1508
		ctx, cancel := context.WithCancel(req.Context())
1509
		defer cancel()
1510
		var stream runtime.ServerTransportStream
1511
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1512
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1513
		var err error
1514
		var annotatedContext context.Context
1515
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1516
		if err != nil {
1517
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1518
			return
1519
		}
1520
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1521
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1522
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1523
		if err != nil {
1524
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1525
			return
1526
		}
1527
1528
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1529
1530
	})
1531
1532
	return nil
1533
}
1534
1535
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1536
// UnaryRPC     :call WatchServer directly.
1537
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1538
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1539
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1540
1541
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1542
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1543
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1544
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1545
		return
1546
	})
1547
1548
	return nil
1549
}
1550
1551
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1552
// UnaryRPC     :call SchemaServer directly.
1553
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1554
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1555
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1556
1557
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1558
		ctx, cancel := context.WithCancel(req.Context())
1559
		defer cancel()
1560
		var stream runtime.ServerTransportStream
1561
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1562
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1563
		var err error
1564
		var annotatedContext context.Context
1565
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1566
		if err != nil {
1567
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1568
			return
1569
		}
1570
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1571
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1572
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1573
		if err != nil {
1574
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1575
			return
1576
		}
1577
1578
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1579
1580
	})
1581
1582
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1583
		ctx, cancel := context.WithCancel(req.Context())
1584
		defer cancel()
1585
		var stream runtime.ServerTransportStream
1586
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1587
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1588
		var err error
1589
		var annotatedContext context.Context
1590
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1591
		if err != nil {
1592
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1593
			return
1594
		}
1595
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1596
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1597
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1598
		if err != nil {
1599
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1600
			return
1601
		}
1602
1603
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1604
1605
	})
1606
1607
	return nil
1608
}
1609
1610
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1611
// UnaryRPC     :call DataServer directly.
1612
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1613
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1614
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1615
1616
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1617
		ctx, cancel := context.WithCancel(req.Context())
1618
		defer cancel()
1619
		var stream runtime.ServerTransportStream
1620
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1621
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1622
		var err error
1623
		var annotatedContext context.Context
1624
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1625
		if err != nil {
1626
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1627
			return
1628
		}
1629
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1630
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1631
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1632
		if err != nil {
1633
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1634
			return
1635
		}
1636
1637
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1638
1639
	})
1640
1641
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1642
		ctx, cancel := context.WithCancel(req.Context())
1643
		defer cancel()
1644
		var stream runtime.ServerTransportStream
1645
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1646
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1647
		var err error
1648
		var annotatedContext context.Context
1649
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1650
		if err != nil {
1651
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1652
			return
1653
		}
1654
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1655
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1656
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1657
		if err != nil {
1658
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1659
			return
1660
		}
1661
1662
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1663
1664
	})
1665
1666
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1667
		ctx, cancel := context.WithCancel(req.Context())
1668
		defer cancel()
1669
		var stream runtime.ServerTransportStream
1670
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1671
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1672
		var err error
1673
		var annotatedContext context.Context
1674
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1675
		if err != nil {
1676
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1677
			return
1678
		}
1679
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1680
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1681
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1682
		if err != nil {
1683
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1684
			return
1685
		}
1686
1687
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1688
1689
	})
1690
1691
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1692
		ctx, cancel := context.WithCancel(req.Context())
1693
		defer cancel()
1694
		var stream runtime.ServerTransportStream
1695
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1696
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1697
		var err error
1698
		var annotatedContext context.Context
1699
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1700
		if err != nil {
1701
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1702
			return
1703
		}
1704
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1705
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1706
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1707
		if err != nil {
1708
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1709
			return
1710
		}
1711
1712
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1713
1714
	})
1715
1716
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1717
		ctx, cancel := context.WithCancel(req.Context())
1718
		defer cancel()
1719
		var stream runtime.ServerTransportStream
1720
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1721
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1722
		var err error
1723
		var annotatedContext context.Context
1724
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1725
		if err != nil {
1726
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1727
			return
1728
		}
1729
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1730
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1731
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1732
		if err != nil {
1733
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1734
			return
1735
		}
1736
1737
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1738
1739
	})
1740
1741
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1742
		ctx, cancel := context.WithCancel(req.Context())
1743
		defer cancel()
1744
		var stream runtime.ServerTransportStream
1745
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1746
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1747
		var err error
1748
		var annotatedContext context.Context
1749
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1750
		if err != nil {
1751
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1752
			return
1753
		}
1754
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1755
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1756
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1757
		if err != nil {
1758
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1759
			return
1760
		}
1761
1762
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1763
1764
	})
1765
1766
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1767
		ctx, cancel := context.WithCancel(req.Context())
1768
		defer cancel()
1769
		var stream runtime.ServerTransportStream
1770
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1771
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1772
		var err error
1773
		var annotatedContext context.Context
1774
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1775
		if err != nil {
1776
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1777
			return
1778
		}
1779
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1780
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1781
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1782
		if err != nil {
1783
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1784
			return
1785
		}
1786
1787
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1788
1789
	})
1790
1791
	return nil
1792
}
1793
1794
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1795
// UnaryRPC     :call BundleServer directly.
1796
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1797
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1798
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1799
1800
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1801
		ctx, cancel := context.WithCancel(req.Context())
1802
		defer cancel()
1803
		var stream runtime.ServerTransportStream
1804
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1805
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1806
		var err error
1807
		var annotatedContext context.Context
1808
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1809
		if err != nil {
1810
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1811
			return
1812
		}
1813
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1814
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1815
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1816
		if err != nil {
1817
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1818
			return
1819
		}
1820
1821
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1822
1823
	})
1824
1825
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1826
		ctx, cancel := context.WithCancel(req.Context())
1827
		defer cancel()
1828
		var stream runtime.ServerTransportStream
1829
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1830
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1831
		var err error
1832
		var annotatedContext context.Context
1833
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
1834
		if err != nil {
1835
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1836
			return
1837
		}
1838
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1839
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1840
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1841
		if err != nil {
1842
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1843
			return
1844
		}
1845
1846
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1847
1848
	})
1849
1850
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1851
		ctx, cancel := context.WithCancel(req.Context())
1852
		defer cancel()
1853
		var stream runtime.ServerTransportStream
1854
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1855
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1856
		var err error
1857
		var annotatedContext context.Context
1858
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
1859
		if err != nil {
1860
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1861
			return
1862
		}
1863
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1864
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1865
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1866
		if err != nil {
1867
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1868
			return
1869
		}
1870
1871
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1872
1873
	})
1874
1875
	return nil
1876
}
1877
1878
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
1879
// UnaryRPC     :call TenancyServer directly.
1880
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1881
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
1882
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
1883
1884
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1885
		ctx, cancel := context.WithCancel(req.Context())
1886
		defer cancel()
1887
		var stream runtime.ServerTransportStream
1888
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1889
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1890
		var err error
1891
		var annotatedContext context.Context
1892
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
1893
		if err != nil {
1894
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1895
			return
1896
		}
1897
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1898
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1899
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1900
		if err != nil {
1901
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1902
			return
1903
		}
1904
1905
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1906
1907
	})
1908
1909
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1910
		ctx, cancel := context.WithCancel(req.Context())
1911
		defer cancel()
1912
		var stream runtime.ServerTransportStream
1913
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1914
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1915
		var err error
1916
		var annotatedContext context.Context
1917
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
1918
		if err != nil {
1919
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1920
			return
1921
		}
1922
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1923
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1924
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1925
		if err != nil {
1926
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1927
			return
1928
		}
1929
1930
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1931
1932
	})
1933
1934
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1935
		ctx, cancel := context.WithCancel(req.Context())
1936
		defer cancel()
1937
		var stream runtime.ServerTransportStream
1938
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1939
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1940
		var err error
1941
		var annotatedContext context.Context
1942
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
1943
		if err != nil {
1944
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1945
			return
1946
		}
1947
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1948
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1949
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1950
		if err != nil {
1951
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1952
			return
1953
		}
1954
1955
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1956
1957
	})
1958
1959
	return nil
1960
}
1961
1962
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
1963
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
1964
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
1965
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
1966
	if err != nil {
1967
		return err
1968
	}
1969
	defer func() {
1970
		if err != nil {
1971
			if cerr := conn.Close(); cerr != nil {
1972
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
1973
			}
1974
			return
1975
		}
1976
		go func() {
1977
			<-ctx.Done()
1978
			if cerr := conn.Close(); cerr != nil {
1979
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
1980
			}
1981
		}()
1982
	}()
1983
1984
	return RegisterPermissionHandler(ctx, mux, conn)
1985
}
1986
1987
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
1988
// The handlers forward requests to the grpc endpoint over "conn".
1989
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
1990
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
1991
}
1992
1993
// RegisterPermissionHandlerClient registers the http handlers for service Permission
1994
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
1995
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
1996
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
1997
// "PermissionClient" to call the correct interceptors.
1998
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
1999
2000
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2001
		ctx, cancel := context.WithCancel(req.Context())
2002
		defer cancel()
2003
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2004
		var err error
2005
		var annotatedContext context.Context
2006
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2007
		if err != nil {
2008
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2009
			return
2010
		}
2011
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2012
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2013
		if err != nil {
2014
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2015
			return
2016
		}
2017
2018
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2019
2020
	})
2021
2022
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2023
		ctx, cancel := context.WithCancel(req.Context())
2024
		defer cancel()
2025
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2026
		var err error
2027
		var annotatedContext context.Context
2028
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2029
		if err != nil {
2030
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2031
			return
2032
		}
2033
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2034
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2035
		if err != nil {
2036
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2037
			return
2038
		}
2039
2040
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2041
2042
	})
2043
2044
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2045
		ctx, cancel := context.WithCancel(req.Context())
2046
		defer cancel()
2047
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2048
		var err error
2049
		var annotatedContext context.Context
2050
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2051
		if err != nil {
2052
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2053
			return
2054
		}
2055
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2056
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2057
		if err != nil {
2058
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2059
			return
2060
		}
2061
2062
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2063
2064
	})
2065
2066
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2067
		ctx, cancel := context.WithCancel(req.Context())
2068
		defer cancel()
2069
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2070
		var err error
2071
		var annotatedContext context.Context
2072
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2073
		if err != nil {
2074
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2075
			return
2076
		}
2077
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2078
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2079
		if err != nil {
2080
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2081
			return
2082
		}
2083
2084
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2085
2086
	})
2087
2088
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2089
		ctx, cancel := context.WithCancel(req.Context())
2090
		defer cancel()
2091
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2092
		var err error
2093
		var annotatedContext context.Context
2094
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2095
		if err != nil {
2096
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2097
			return
2098
		}
2099
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2100
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2101
		if err != nil {
2102
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2103
			return
2104
		}
2105
2106
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2107
2108
	})
2109
2110
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2111
		ctx, cancel := context.WithCancel(req.Context())
2112
		defer cancel()
2113
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2114
		var err error
2115
		var annotatedContext context.Context
2116
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2117
		if err != nil {
2118
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2119
			return
2120
		}
2121
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2122
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2123
		if err != nil {
2124
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2125
			return
2126
		}
2127
2128
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2129
2130
	})
2131
2132
	return nil
2133
}
2134
2135
var (
2136
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2137
2138
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2139
2140
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2141
2142
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2143
2144
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2145
2146
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2147
)
2148
2149
var (
2150
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2151
2152
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2153
2154
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2155
2156
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2157
2158
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2159
2160
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2161
)
2162
2163
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2164
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2165
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2166
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2167
	if err != nil {
2168
		return err
2169
	}
2170
	defer func() {
2171
		if err != nil {
2172
			if cerr := conn.Close(); cerr != nil {
2173
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2174
			}
2175
			return
2176
		}
2177
		go func() {
2178
			<-ctx.Done()
2179
			if cerr := conn.Close(); cerr != nil {
2180
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2181
			}
2182
		}()
2183
	}()
2184
2185
	return RegisterWatchHandler(ctx, mux, conn)
2186
}
2187
2188
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2189
// The handlers forward requests to the grpc endpoint over "conn".
2190
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2191
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2192
}
2193
2194
// RegisterWatchHandlerClient registers the http handlers for service Watch
2195
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2196
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2197
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2198
// "WatchClient" to call the correct interceptors.
2199
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2200
2201
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2202
		ctx, cancel := context.WithCancel(req.Context())
2203
		defer cancel()
2204
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2205
		var err error
2206
		var annotatedContext context.Context
2207
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2208
		if err != nil {
2209
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2210
			return
2211
		}
2212
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2213
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2214
		if err != nil {
2215
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2216
			return
2217
		}
2218
2219
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2220
2221
	})
2222
2223
	return nil
2224
}
2225
2226
var (
2227
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2228
)
2229
2230
var (
2231
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2232
)
2233
2234
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2235
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2236
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2237
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2238
	if err != nil {
2239
		return err
2240
	}
2241
	defer func() {
2242
		if err != nil {
2243
			if cerr := conn.Close(); cerr != nil {
2244
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2245
			}
2246
			return
2247
		}
2248
		go func() {
2249
			<-ctx.Done()
2250
			if cerr := conn.Close(); cerr != nil {
2251
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2252
			}
2253
		}()
2254
	}()
2255
2256
	return RegisterSchemaHandler(ctx, mux, conn)
2257
}
2258
2259
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2260
// The handlers forward requests to the grpc endpoint over "conn".
2261
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2262
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2263
}
2264
2265
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2266
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2267
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2268
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2269
// "SchemaClient" to call the correct interceptors.
2270
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2271
2272
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2273
		ctx, cancel := context.WithCancel(req.Context())
2274
		defer cancel()
2275
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2276
		var err error
2277
		var annotatedContext context.Context
2278
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2279
		if err != nil {
2280
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2281
			return
2282
		}
2283
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2284
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2285
		if err != nil {
2286
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2287
			return
2288
		}
2289
2290
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2291
2292
	})
2293
2294
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2295
		ctx, cancel := context.WithCancel(req.Context())
2296
		defer cancel()
2297
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2298
		var err error
2299
		var annotatedContext context.Context
2300
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2301
		if err != nil {
2302
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2303
			return
2304
		}
2305
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2306
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2307
		if err != nil {
2308
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2309
			return
2310
		}
2311
2312
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2313
2314
	})
2315
2316
	return nil
2317
}
2318
2319
var (
2320
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2321
2322
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2323
)
2324
2325
var (
2326
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2327
2328
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2329
)
2330
2331
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2332
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2333
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2334
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2335
	if err != nil {
2336
		return err
2337
	}
2338
	defer func() {
2339
		if err != nil {
2340
			if cerr := conn.Close(); cerr != nil {
2341
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2342
			}
2343
			return
2344
		}
2345
		go func() {
2346
			<-ctx.Done()
2347
			if cerr := conn.Close(); cerr != nil {
2348
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2349
			}
2350
		}()
2351
	}()
2352
2353
	return RegisterDataHandler(ctx, mux, conn)
2354
}
2355
2356
// RegisterDataHandler registers the http handlers for service Data to "mux".
2357
// The handlers forward requests to the grpc endpoint over "conn".
2358
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2359
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2360
}
2361
2362
// RegisterDataHandlerClient registers the http handlers for service Data
2363
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2364
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2365
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2366
// "DataClient" to call the correct interceptors.
2367
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2368
2369
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2370
		ctx, cancel := context.WithCancel(req.Context())
2371
		defer cancel()
2372
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2373
		var err error
2374
		var annotatedContext context.Context
2375
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2376
		if err != nil {
2377
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2378
			return
2379
		}
2380
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2381
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2382
		if err != nil {
2383
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2384
			return
2385
		}
2386
2387
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2388
2389
	})
2390
2391
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2392
		ctx, cancel := context.WithCancel(req.Context())
2393
		defer cancel()
2394
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2395
		var err error
2396
		var annotatedContext context.Context
2397
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2398
		if err != nil {
2399
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2400
			return
2401
		}
2402
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2403
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2404
		if err != nil {
2405
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2406
			return
2407
		}
2408
2409
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2410
2411
	})
2412
2413
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2414
		ctx, cancel := context.WithCancel(req.Context())
2415
		defer cancel()
2416
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2417
		var err error
2418
		var annotatedContext context.Context
2419
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2420
		if err != nil {
2421
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2422
			return
2423
		}
2424
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2425
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2426
		if err != nil {
2427
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2428
			return
2429
		}
2430
2431
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2432
2433
	})
2434
2435
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2436
		ctx, cancel := context.WithCancel(req.Context())
2437
		defer cancel()
2438
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2439
		var err error
2440
		var annotatedContext context.Context
2441
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2442
		if err != nil {
2443
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2444
			return
2445
		}
2446
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2447
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2448
		if err != nil {
2449
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2450
			return
2451
		}
2452
2453
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2454
2455
	})
2456
2457
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2458
		ctx, cancel := context.WithCancel(req.Context())
2459
		defer cancel()
2460
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2461
		var err error
2462
		var annotatedContext context.Context
2463
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2464
		if err != nil {
2465
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2466
			return
2467
		}
2468
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2469
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2470
		if err != nil {
2471
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2472
			return
2473
		}
2474
2475
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2476
2477
	})
2478
2479
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2480
		ctx, cancel := context.WithCancel(req.Context())
2481
		defer cancel()
2482
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2483
		var err error
2484
		var annotatedContext context.Context
2485
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2486
		if err != nil {
2487
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2488
			return
2489
		}
2490
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2491
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2492
		if err != nil {
2493
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2494
			return
2495
		}
2496
2497
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2498
2499
	})
2500
2501
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2502
		ctx, cancel := context.WithCancel(req.Context())
2503
		defer cancel()
2504
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2505
		var err error
2506
		var annotatedContext context.Context
2507
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2508
		if err != nil {
2509
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2510
			return
2511
		}
2512
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2513
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2514
		if err != nil {
2515
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2516
			return
2517
		}
2518
2519
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2520
2521
	})
2522
2523
	return nil
2524
}
2525
2526
var (
2527
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2528
2529
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2530
2531
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2532
2533
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2534
2535
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2536
2537
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2538
2539
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2540
)
2541
2542
var (
2543
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2544
2545
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2546
2547
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2548
2549
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2550
2551
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2552
2553
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2554
2555
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2556
)
2557
2558
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2559
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2560
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2561
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2562
	if err != nil {
2563
		return err
2564
	}
2565
	defer func() {
2566
		if err != nil {
2567
			if cerr := conn.Close(); cerr != nil {
2568
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2569
			}
2570
			return
2571
		}
2572
		go func() {
2573
			<-ctx.Done()
2574
			if cerr := conn.Close(); cerr != nil {
2575
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2576
			}
2577
		}()
2578
	}()
2579
2580
	return RegisterBundleHandler(ctx, mux, conn)
2581
}
2582
2583
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2584
// The handlers forward requests to the grpc endpoint over "conn".
2585
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2586
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2587
}
2588
2589
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2590
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2591
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2592
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2593
// "BundleClient" to call the correct interceptors.
2594
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2595
2596
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2597
		ctx, cancel := context.WithCancel(req.Context())
2598
		defer cancel()
2599
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2600
		var err error
2601
		var annotatedContext context.Context
2602
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2603
		if err != nil {
2604
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2605
			return
2606
		}
2607
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2608
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2609
		if err != nil {
2610
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2611
			return
2612
		}
2613
2614
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2615
2616
	})
2617
2618
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2619
		ctx, cancel := context.WithCancel(req.Context())
2620
		defer cancel()
2621
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2622
		var err error
2623
		var annotatedContext context.Context
2624
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2625
		if err != nil {
2626
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2627
			return
2628
		}
2629
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2630
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2631
		if err != nil {
2632
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2633
			return
2634
		}
2635
2636
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2637
2638
	})
2639
2640
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2641
		ctx, cancel := context.WithCancel(req.Context())
2642
		defer cancel()
2643
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2644
		var err error
2645
		var annotatedContext context.Context
2646
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2647
		if err != nil {
2648
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2649
			return
2650
		}
2651
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2652
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2653
		if err != nil {
2654
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2655
			return
2656
		}
2657
2658
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2659
2660
	})
2661
2662
	return nil
2663
}
2664
2665
var (
2666
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2667
2668
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2669
2670
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2671
)
2672
2673
var (
2674
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2675
2676
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2677
2678
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2679
)
2680
2681
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2682
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2683
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2684
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2685
	if err != nil {
2686
		return err
2687
	}
2688
	defer func() {
2689
		if err != nil {
2690
			if cerr := conn.Close(); cerr != nil {
2691
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2692
			}
2693
			return
2694
		}
2695
		go func() {
2696
			<-ctx.Done()
2697
			if cerr := conn.Close(); cerr != nil {
2698
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2699
			}
2700
		}()
2701
	}()
2702
2703
	return RegisterTenancyHandler(ctx, mux, conn)
2704
}
2705
2706
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2707
// The handlers forward requests to the grpc endpoint over "conn".
2708
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2709
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2710
}
2711
2712
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2713
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2714
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2715
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2716
// "TenancyClient" to call the correct interceptors.
2717
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2718
2719
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2720
		ctx, cancel := context.WithCancel(req.Context())
2721
		defer cancel()
2722
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2723
		var err error
2724
		var annotatedContext context.Context
2725
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2726
		if err != nil {
2727
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2728
			return
2729
		}
2730
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2731
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2732
		if err != nil {
2733
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2734
			return
2735
		}
2736
2737
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2738
2739
	})
2740
2741
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2742
		ctx, cancel := context.WithCancel(req.Context())
2743
		defer cancel()
2744
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2745
		var err error
2746
		var annotatedContext context.Context
2747
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2748
		if err != nil {
2749
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2750
			return
2751
		}
2752
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2753
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2754
		if err != nil {
2755
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2756
			return
2757
		}
2758
2759
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2760
2761
	})
2762
2763
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2764
		ctx, cancel := context.WithCancel(req.Context())
2765
		defer cancel()
2766
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2767
		var err error
2768
		var annotatedContext context.Context
2769
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2770
		if err != nil {
2771
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2772
			return
2773
		}
2774
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2775
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2776
		if err != nil {
2777
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2778
			return
2779
		}
2780
2781
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2782
2783
	})
2784
2785
	return nil
2786
}
2787
2788
var (
2789
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
2790
2791
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
2792
2793
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
2794
)
2795
2796
var (
2797
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
2798
2799
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
2800
2801
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
2802
)
2803