Passed
Pull Request — master (#1691)
by
unknown
03:16
created

basev1.request_Permission_LookupEntitiesStream_0   B

Complexity

Conditions 7

Size

Total Lines 35
Code Lines 24

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 7
eloc 24
nop 5
dl 0
loc 35
rs 7.904
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq PermissionCheckRequest
36
	var metadata runtime.ServerMetadata
37
38
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
39
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
40
	}
41
42
	var (
43
		val string
44
		ok  bool
45
		err error
46
		_   = err
47
	)
48
49
	val, ok = pathParams["tenant_id"]
50
	if !ok {
51
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
52
	}
53
54
	protoReq.TenantId, err = runtime.String(val)
55
	if err != nil {
56
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
57
	}
58
59
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
60
	return msg, metadata, err
61
62
}
63
64
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
65
	var protoReq PermissionCheckRequest
66
	var metadata runtime.ServerMetadata
67
68
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
69
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
70
	}
71
72
	var (
73
		val string
74
		ok  bool
75
		err error
76
		_   = err
77
	)
78
79
	val, ok = pathParams["tenant_id"]
80
	if !ok {
81
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
82
	}
83
84
	protoReq.TenantId, err = runtime.String(val)
85
	if err != nil {
86
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
87
	}
88
89
	msg, err := server.Check(ctx, &protoReq)
90
	return msg, metadata, err
91
92
}
93
94
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
95
	var protoReq PermissionExpandRequest
96
	var metadata runtime.ServerMetadata
97
98
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
99
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
100
	}
101
102
	var (
103
		val string
104
		ok  bool
105
		err error
106
		_   = err
107
	)
108
109
	val, ok = pathParams["tenant_id"]
110
	if !ok {
111
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
112
	}
113
114
	protoReq.TenantId, err = runtime.String(val)
115
	if err != nil {
116
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
117
	}
118
119
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
120
	return msg, metadata, err
121
122
}
123
124
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
125
	var protoReq PermissionExpandRequest
126
	var metadata runtime.ServerMetadata
127
128
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
129
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
130
	}
131
132
	var (
133
		val string
134
		ok  bool
135
		err error
136
		_   = err
137
	)
138
139
	val, ok = pathParams["tenant_id"]
140
	if !ok {
141
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
142
	}
143
144
	protoReq.TenantId, err = runtime.String(val)
145
	if err != nil {
146
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
147
	}
148
149
	msg, err := server.Expand(ctx, &protoReq)
150
	return msg, metadata, err
151
152
}
153
154
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
155
	var protoReq PermissionLookupEntityRequest
156
	var metadata runtime.ServerMetadata
157
158
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
160
	}
161
162
	var (
163
		val string
164
		ok  bool
165
		err error
166
		_   = err
167
	)
168
169
	val, ok = pathParams["tenant_id"]
170
	if !ok {
171
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
172
	}
173
174
	protoReq.TenantId, err = runtime.String(val)
175
	if err != nil {
176
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
177
	}
178
179
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
180
	return msg, metadata, err
181
182
}
183
184
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
185
	var protoReq PermissionLookupEntityRequest
186
	var metadata runtime.ServerMetadata
187
188
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
189
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
190
	}
191
192
	var (
193
		val string
194
		ok  bool
195
		err error
196
		_   = err
197
	)
198
199
	val, ok = pathParams["tenant_id"]
200
	if !ok {
201
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
202
	}
203
204
	protoReq.TenantId, err = runtime.String(val)
205
	if err != nil {
206
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
207
	}
208
209
	msg, err := server.LookupEntity(ctx, &protoReq)
210
	return msg, metadata, err
211
212
}
213
214
func request_Permission_LookupEntities_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
215
	var protoReq PermissionsLookupEntityRequest
216
	var metadata runtime.ServerMetadata
217
218
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
219
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
220
	}
221
222
	var (
223
		val string
224
		ok  bool
225
		err error
226
		_   = err
227
	)
228
229
	val, ok = pathParams["tenant_id"]
230
	if !ok {
231
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
232
	}
233
234
	protoReq.TenantId, err = runtime.String(val)
235
	if err != nil {
236
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
237
	}
238
239
	msg, err := client.LookupEntities(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
240
	return msg, metadata, err
241
242
}
243
244
func local_request_Permission_LookupEntities_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
245
	var protoReq PermissionsLookupEntityRequest
246
	var metadata runtime.ServerMetadata
247
248
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
250
	}
251
252
	var (
253
		val string
254
		ok  bool
255
		err error
256
		_   = err
257
	)
258
259
	val, ok = pathParams["tenant_id"]
260
	if !ok {
261
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
262
	}
263
264
	protoReq.TenantId, err = runtime.String(val)
265
	if err != nil {
266
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
267
	}
268
269
	msg, err := server.LookupEntities(ctx, &protoReq)
270
	return msg, metadata, err
271
272
}
273
274
func request_Permission_LookupEntitiesStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntitiesStreamClient, runtime.ServerMetadata, error) {
275
	var protoReq PermissionsLookupEntityRequest
276
	var metadata runtime.ServerMetadata
277
278
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
279
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
280
	}
281
282
	var (
283
		val string
284
		ok  bool
285
		err error
286
		_   = err
287
	)
288
289
	val, ok = pathParams["tenant_id"]
290
	if !ok {
291
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
292
	}
293
294
	protoReq.TenantId, err = runtime.String(val)
295
	if err != nil {
296
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
297
	}
298
299
	stream, err := client.LookupEntitiesStream(ctx, &protoReq)
300
	if err != nil {
301
		return nil, metadata, err
302
	}
303
	header, err := stream.Header()
304
	if err != nil {
305
		return nil, metadata, err
306
	}
307
	metadata.HeaderMD = header
308
	return stream, metadata, nil
309
310
}
311
312
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
313
	var protoReq PermissionLookupEntityRequest
314
	var metadata runtime.ServerMetadata
315
316
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
317
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
318
	}
319
320
	var (
321
		val string
322
		ok  bool
323
		err error
324
		_   = err
325
	)
326
327
	val, ok = pathParams["tenant_id"]
328
	if !ok {
329
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
330
	}
331
332
	protoReq.TenantId, err = runtime.String(val)
333
	if err != nil {
334
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
335
	}
336
337
	stream, err := client.LookupEntityStream(ctx, &protoReq)
338
	if err != nil {
339
		return nil, metadata, err
340
	}
341
	header, err := stream.Header()
342
	if err != nil {
343
		return nil, metadata, err
344
	}
345
	metadata.HeaderMD = header
346
	return stream, metadata, nil
347
348
}
349
350
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
351
	var protoReq PermissionLookupSubjectRequest
352
	var metadata runtime.ServerMetadata
353
354
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
355
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
356
	}
357
358
	var (
359
		val string
360
		ok  bool
361
		err error
362
		_   = err
363
	)
364
365
	val, ok = pathParams["tenant_id"]
366
	if !ok {
367
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
368
	}
369
370
	protoReq.TenantId, err = runtime.String(val)
371
	if err != nil {
372
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
373
	}
374
375
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
376
	return msg, metadata, err
377
378
}
379
380
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
381
	var protoReq PermissionLookupSubjectRequest
382
	var metadata runtime.ServerMetadata
383
384
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
385
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
386
	}
387
388
	var (
389
		val string
390
		ok  bool
391
		err error
392
		_   = err
393
	)
394
395
	val, ok = pathParams["tenant_id"]
396
	if !ok {
397
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
398
	}
399
400
	protoReq.TenantId, err = runtime.String(val)
401
	if err != nil {
402
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
403
	}
404
405
	msg, err := server.LookupSubject(ctx, &protoReq)
406
	return msg, metadata, err
407
408
}
409
410
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
411
	var protoReq PermissionSubjectPermissionRequest
412
	var metadata runtime.ServerMetadata
413
414
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
415
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
416
	}
417
418
	var (
419
		val string
420
		ok  bool
421
		err error
422
		_   = err
423
	)
424
425
	val, ok = pathParams["tenant_id"]
426
	if !ok {
427
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
428
	}
429
430
	protoReq.TenantId, err = runtime.String(val)
431
	if err != nil {
432
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
433
	}
434
435
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
436
	return msg, metadata, err
437
438
}
439
440
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
441
	var protoReq PermissionSubjectPermissionRequest
442
	var metadata runtime.ServerMetadata
443
444
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
445
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
446
	}
447
448
	var (
449
		val string
450
		ok  bool
451
		err error
452
		_   = err
453
	)
454
455
	val, ok = pathParams["tenant_id"]
456
	if !ok {
457
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
458
	}
459
460
	protoReq.TenantId, err = runtime.String(val)
461
	if err != nil {
462
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
463
	}
464
465
	msg, err := server.SubjectPermission(ctx, &protoReq)
466
	return msg, metadata, err
467
468
}
469
470
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
471
	var protoReq WatchRequest
472
	var metadata runtime.ServerMetadata
473
474
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
475
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
476
	}
477
478
	var (
479
		val string
480
		ok  bool
481
		err error
482
		_   = err
483
	)
484
485
	val, ok = pathParams["tenant_id"]
486
	if !ok {
487
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
488
	}
489
490
	protoReq.TenantId, err = runtime.String(val)
491
	if err != nil {
492
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
493
	}
494
495
	stream, err := client.Watch(ctx, &protoReq)
496
	if err != nil {
497
		return nil, metadata, err
498
	}
499
	header, err := stream.Header()
500
	if err != nil {
501
		return nil, metadata, err
502
	}
503
	metadata.HeaderMD = header
504
	return stream, metadata, nil
505
506
}
507
508
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
509
	var protoReq SchemaWriteRequest
510
	var metadata runtime.ServerMetadata
511
512
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
513
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
514
	}
515
516
	var (
517
		val string
518
		ok  bool
519
		err error
520
		_   = err
521
	)
522
523
	val, ok = pathParams["tenant_id"]
524
	if !ok {
525
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
526
	}
527
528
	protoReq.TenantId, err = runtime.String(val)
529
	if err != nil {
530
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
531
	}
532
533
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
534
	return msg, metadata, err
535
536
}
537
538
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
539
	var protoReq SchemaWriteRequest
540
	var metadata runtime.ServerMetadata
541
542
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
543
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
544
	}
545
546
	var (
547
		val string
548
		ok  bool
549
		err error
550
		_   = err
551
	)
552
553
	val, ok = pathParams["tenant_id"]
554
	if !ok {
555
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
556
	}
557
558
	protoReq.TenantId, err = runtime.String(val)
559
	if err != nil {
560
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
561
	}
562
563
	msg, err := server.Write(ctx, &protoReq)
564
	return msg, metadata, err
565
566
}
567
568
func request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
569
	var protoReq SchemaPartialWriteRequest
570
	var metadata runtime.ServerMetadata
571
572
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
573
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
574
	}
575
576
	var (
577
		val string
578
		ok  bool
579
		err error
580
		_   = err
581
	)
582
583
	val, ok = pathParams["tenant_id"]
584
	if !ok {
585
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
586
	}
587
588
	protoReq.TenantId, err = runtime.String(val)
589
	if err != nil {
590
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
591
	}
592
593
	msg, err := client.PartialWrite(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
594
	return msg, metadata, err
595
596
}
597
598
func local_request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
599
	var protoReq SchemaPartialWriteRequest
600
	var metadata runtime.ServerMetadata
601
602
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
603
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
604
	}
605
606
	var (
607
		val string
608
		ok  bool
609
		err error
610
		_   = err
611
	)
612
613
	val, ok = pathParams["tenant_id"]
614
	if !ok {
615
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
616
	}
617
618
	protoReq.TenantId, err = runtime.String(val)
619
	if err != nil {
620
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
621
	}
622
623
	msg, err := server.PartialWrite(ctx, &protoReq)
624
	return msg, metadata, err
625
626
}
627
628
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
629
	var protoReq SchemaReadRequest
630
	var metadata runtime.ServerMetadata
631
632
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
633
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
634
	}
635
636
	var (
637
		val string
638
		ok  bool
639
		err error
640
		_   = err
641
	)
642
643
	val, ok = pathParams["tenant_id"]
644
	if !ok {
645
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
646
	}
647
648
	protoReq.TenantId, err = runtime.String(val)
649
	if err != nil {
650
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
651
	}
652
653
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
654
	return msg, metadata, err
655
656
}
657
658
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
659
	var protoReq SchemaReadRequest
660
	var metadata runtime.ServerMetadata
661
662
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
663
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
664
	}
665
666
	var (
667
		val string
668
		ok  bool
669
		err error
670
		_   = err
671
	)
672
673
	val, ok = pathParams["tenant_id"]
674
	if !ok {
675
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
676
	}
677
678
	protoReq.TenantId, err = runtime.String(val)
679
	if err != nil {
680
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
681
	}
682
683
	msg, err := server.Read(ctx, &protoReq)
684
	return msg, metadata, err
685
686
}
687
688
func request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
689
	var protoReq SchemaListRequest
690
	var metadata runtime.ServerMetadata
691
692
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
693
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
694
	}
695
696
	var (
697
		val string
698
		ok  bool
699
		err error
700
		_   = err
701
	)
702
703
	val, ok = pathParams["tenant_id"]
704
	if !ok {
705
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
706
	}
707
708
	protoReq.TenantId, err = runtime.String(val)
709
	if err != nil {
710
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
711
	}
712
713
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
714
	return msg, metadata, err
715
716
}
717
718
func local_request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
719
	var protoReq SchemaListRequest
720
	var metadata runtime.ServerMetadata
721
722
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
723
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
724
	}
725
726
	var (
727
		val string
728
		ok  bool
729
		err error
730
		_   = err
731
	)
732
733
	val, ok = pathParams["tenant_id"]
734
	if !ok {
735
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
736
	}
737
738
	protoReq.TenantId, err = runtime.String(val)
739
	if err != nil {
740
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
741
	}
742
743
	msg, err := server.List(ctx, &protoReq)
744
	return msg, metadata, err
745
746
}
747
748
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
749
	var protoReq DataWriteRequest
750
	var metadata runtime.ServerMetadata
751
752
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
753
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
754
	}
755
756
	var (
757
		val string
758
		ok  bool
759
		err error
760
		_   = err
761
	)
762
763
	val, ok = pathParams["tenant_id"]
764
	if !ok {
765
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
766
	}
767
768
	protoReq.TenantId, err = runtime.String(val)
769
	if err != nil {
770
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
771
	}
772
773
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
774
	return msg, metadata, err
775
776
}
777
778
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
779
	var protoReq DataWriteRequest
780
	var metadata runtime.ServerMetadata
781
782
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
783
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
784
	}
785
786
	var (
787
		val string
788
		ok  bool
789
		err error
790
		_   = err
791
	)
792
793
	val, ok = pathParams["tenant_id"]
794
	if !ok {
795
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
796
	}
797
798
	protoReq.TenantId, err = runtime.String(val)
799
	if err != nil {
800
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
801
	}
802
803
	msg, err := server.Write(ctx, &protoReq)
804
	return msg, metadata, err
805
806
}
807
808
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
809
	var protoReq RelationshipWriteRequest
810
	var metadata runtime.ServerMetadata
811
812
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
813
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
814
	}
815
816
	var (
817
		val string
818
		ok  bool
819
		err error
820
		_   = err
821
	)
822
823
	val, ok = pathParams["tenant_id"]
824
	if !ok {
825
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
826
	}
827
828
	protoReq.TenantId, err = runtime.String(val)
829
	if err != nil {
830
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
831
	}
832
833
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
834
	return msg, metadata, err
835
836
}
837
838
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
839
	var protoReq RelationshipWriteRequest
840
	var metadata runtime.ServerMetadata
841
842
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
843
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
844
	}
845
846
	var (
847
		val string
848
		ok  bool
849
		err error
850
		_   = err
851
	)
852
853
	val, ok = pathParams["tenant_id"]
854
	if !ok {
855
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
856
	}
857
858
	protoReq.TenantId, err = runtime.String(val)
859
	if err != nil {
860
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
861
	}
862
863
	msg, err := server.WriteRelationships(ctx, &protoReq)
864
	return msg, metadata, err
865
866
}
867
868
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
869
	var protoReq RelationshipReadRequest
870
	var metadata runtime.ServerMetadata
871
872
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
873
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
874
	}
875
876
	var (
877
		val string
878
		ok  bool
879
		err error
880
		_   = err
881
	)
882
883
	val, ok = pathParams["tenant_id"]
884
	if !ok {
885
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
886
	}
887
888
	protoReq.TenantId, err = runtime.String(val)
889
	if err != nil {
890
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
891
	}
892
893
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
894
	return msg, metadata, err
895
896
}
897
898
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
899
	var protoReq RelationshipReadRequest
900
	var metadata runtime.ServerMetadata
901
902
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
903
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
904
	}
905
906
	var (
907
		val string
908
		ok  bool
909
		err error
910
		_   = err
911
	)
912
913
	val, ok = pathParams["tenant_id"]
914
	if !ok {
915
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
916
	}
917
918
	protoReq.TenantId, err = runtime.String(val)
919
	if err != nil {
920
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
921
	}
922
923
	msg, err := server.ReadRelationships(ctx, &protoReq)
924
	return msg, metadata, err
925
926
}
927
928
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
929
	var protoReq AttributeReadRequest
930
	var metadata runtime.ServerMetadata
931
932
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
933
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
934
	}
935
936
	var (
937
		val string
938
		ok  bool
939
		err error
940
		_   = err
941
	)
942
943
	val, ok = pathParams["tenant_id"]
944
	if !ok {
945
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
946
	}
947
948
	protoReq.TenantId, err = runtime.String(val)
949
	if err != nil {
950
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
951
	}
952
953
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
954
	return msg, metadata, err
955
956
}
957
958
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
959
	var protoReq AttributeReadRequest
960
	var metadata runtime.ServerMetadata
961
962
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
963
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
964
	}
965
966
	var (
967
		val string
968
		ok  bool
969
		err error
970
		_   = err
971
	)
972
973
	val, ok = pathParams["tenant_id"]
974
	if !ok {
975
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
976
	}
977
978
	protoReq.TenantId, err = runtime.String(val)
979
	if err != nil {
980
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
981
	}
982
983
	msg, err := server.ReadAttributes(ctx, &protoReq)
984
	return msg, metadata, err
985
986
}
987
988
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
989
	var protoReq DataDeleteRequest
990
	var metadata runtime.ServerMetadata
991
992
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
993
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
994
	}
995
996
	var (
997
		val string
998
		ok  bool
999
		err error
1000
		_   = err
1001
	)
1002
1003
	val, ok = pathParams["tenant_id"]
1004
	if !ok {
1005
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1006
	}
1007
1008
	protoReq.TenantId, err = runtime.String(val)
1009
	if err != nil {
1010
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1011
	}
1012
1013
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1014
	return msg, metadata, err
1015
1016
}
1017
1018
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1019
	var protoReq DataDeleteRequest
1020
	var metadata runtime.ServerMetadata
1021
1022
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1023
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1024
	}
1025
1026
	var (
1027
		val string
1028
		ok  bool
1029
		err error
1030
		_   = err
1031
	)
1032
1033
	val, ok = pathParams["tenant_id"]
1034
	if !ok {
1035
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1036
	}
1037
1038
	protoReq.TenantId, err = runtime.String(val)
1039
	if err != nil {
1040
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1041
	}
1042
1043
	msg, err := server.Delete(ctx, &protoReq)
1044
	return msg, metadata, err
1045
1046
}
1047
1048
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1049
	var protoReq RelationshipDeleteRequest
1050
	var metadata runtime.ServerMetadata
1051
1052
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1053
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1054
	}
1055
1056
	var (
1057
		val string
1058
		ok  bool
1059
		err error
1060
		_   = err
1061
	)
1062
1063
	val, ok = pathParams["tenant_id"]
1064
	if !ok {
1065
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1066
	}
1067
1068
	protoReq.TenantId, err = runtime.String(val)
1069
	if err != nil {
1070
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1071
	}
1072
1073
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1074
	return msg, metadata, err
1075
1076
}
1077
1078
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1079
	var protoReq RelationshipDeleteRequest
1080
	var metadata runtime.ServerMetadata
1081
1082
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1083
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1084
	}
1085
1086
	var (
1087
		val string
1088
		ok  bool
1089
		err error
1090
		_   = err
1091
	)
1092
1093
	val, ok = pathParams["tenant_id"]
1094
	if !ok {
1095
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1096
	}
1097
1098
	protoReq.TenantId, err = runtime.String(val)
1099
	if err != nil {
1100
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1101
	}
1102
1103
	msg, err := server.DeleteRelationships(ctx, &protoReq)
1104
	return msg, metadata, err
1105
1106
}
1107
1108
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1109
	var protoReq BundleRunRequest
1110
	var metadata runtime.ServerMetadata
1111
1112
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1113
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1114
	}
1115
1116
	var (
1117
		val string
1118
		ok  bool
1119
		err error
1120
		_   = err
1121
	)
1122
1123
	val, ok = pathParams["tenant_id"]
1124
	if !ok {
1125
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1126
	}
1127
1128
	protoReq.TenantId, err = runtime.String(val)
1129
	if err != nil {
1130
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1131
	}
1132
1133
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1134
	return msg, metadata, err
1135
1136
}
1137
1138
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1139
	var protoReq BundleRunRequest
1140
	var metadata runtime.ServerMetadata
1141
1142
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1143
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1144
	}
1145
1146
	var (
1147
		val string
1148
		ok  bool
1149
		err error
1150
		_   = err
1151
	)
1152
1153
	val, ok = pathParams["tenant_id"]
1154
	if !ok {
1155
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1156
	}
1157
1158
	protoReq.TenantId, err = runtime.String(val)
1159
	if err != nil {
1160
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1161
	}
1162
1163
	msg, err := server.RunBundle(ctx, &protoReq)
1164
	return msg, metadata, err
1165
1166
}
1167
1168
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1169
	var protoReq BundleWriteRequest
1170
	var metadata runtime.ServerMetadata
1171
1172
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1173
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1174
	}
1175
1176
	var (
1177
		val string
1178
		ok  bool
1179
		err error
1180
		_   = err
1181
	)
1182
1183
	val, ok = pathParams["tenant_id"]
1184
	if !ok {
1185
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1186
	}
1187
1188
	protoReq.TenantId, err = runtime.String(val)
1189
	if err != nil {
1190
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1191
	}
1192
1193
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1194
	return msg, metadata, err
1195
1196
}
1197
1198
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1199
	var protoReq BundleWriteRequest
1200
	var metadata runtime.ServerMetadata
1201
1202
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1203
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1204
	}
1205
1206
	var (
1207
		val string
1208
		ok  bool
1209
		err error
1210
		_   = err
1211
	)
1212
1213
	val, ok = pathParams["tenant_id"]
1214
	if !ok {
1215
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1216
	}
1217
1218
	protoReq.TenantId, err = runtime.String(val)
1219
	if err != nil {
1220
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1221
	}
1222
1223
	msg, err := server.Write(ctx, &protoReq)
1224
	return msg, metadata, err
1225
1226
}
1227
1228
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1229
	var protoReq BundleReadRequest
1230
	var metadata runtime.ServerMetadata
1231
1232
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1233
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1234
	}
1235
1236
	var (
1237
		val string
1238
		ok  bool
1239
		err error
1240
		_   = err
1241
	)
1242
1243
	val, ok = pathParams["tenant_id"]
1244
	if !ok {
1245
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1246
	}
1247
1248
	protoReq.TenantId, err = runtime.String(val)
1249
	if err != nil {
1250
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1251
	}
1252
1253
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1254
	return msg, metadata, err
1255
1256
}
1257
1258
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1259
	var protoReq BundleReadRequest
1260
	var metadata runtime.ServerMetadata
1261
1262
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1263
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1264
	}
1265
1266
	var (
1267
		val string
1268
		ok  bool
1269
		err error
1270
		_   = err
1271
	)
1272
1273
	val, ok = pathParams["tenant_id"]
1274
	if !ok {
1275
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1276
	}
1277
1278
	protoReq.TenantId, err = runtime.String(val)
1279
	if err != nil {
1280
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1281
	}
1282
1283
	msg, err := server.Read(ctx, &protoReq)
1284
	return msg, metadata, err
1285
1286
}
1287
1288
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1289
	var protoReq BundleDeleteRequest
1290
	var metadata runtime.ServerMetadata
1291
1292
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1293
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1294
	}
1295
1296
	var (
1297
		val string
1298
		ok  bool
1299
		err error
1300
		_   = err
1301
	)
1302
1303
	val, ok = pathParams["tenant_id"]
1304
	if !ok {
1305
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1306
	}
1307
1308
	protoReq.TenantId, err = runtime.String(val)
1309
	if err != nil {
1310
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1311
	}
1312
1313
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1314
	return msg, metadata, err
1315
1316
}
1317
1318
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1319
	var protoReq BundleDeleteRequest
1320
	var metadata runtime.ServerMetadata
1321
1322
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1323
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1324
	}
1325
1326
	var (
1327
		val string
1328
		ok  bool
1329
		err error
1330
		_   = err
1331
	)
1332
1333
	val, ok = pathParams["tenant_id"]
1334
	if !ok {
1335
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1336
	}
1337
1338
	protoReq.TenantId, err = runtime.String(val)
1339
	if err != nil {
1340
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1341
	}
1342
1343
	msg, err := server.Delete(ctx, &protoReq)
1344
	return msg, metadata, err
1345
1346
}
1347
1348
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1349
	var protoReq TenantCreateRequest
1350
	var metadata runtime.ServerMetadata
1351
1352
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1353
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1354
	}
1355
1356
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1357
	return msg, metadata, err
1358
1359
}
1360
1361
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1362
	var protoReq TenantCreateRequest
1363
	var metadata runtime.ServerMetadata
1364
1365
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1366
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1367
	}
1368
1369
	msg, err := server.Create(ctx, &protoReq)
1370
	return msg, metadata, err
1371
1372
}
1373
1374
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1375
	var protoReq TenantDeleteRequest
1376
	var metadata runtime.ServerMetadata
1377
1378
	var (
1379
		val string
1380
		ok  bool
1381
		err error
1382
		_   = err
1383
	)
1384
1385
	val, ok = pathParams["id"]
1386
	if !ok {
1387
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1388
	}
1389
1390
	protoReq.Id, err = runtime.String(val)
1391
	if err != nil {
1392
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1393
	}
1394
1395
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1396
	return msg, metadata, err
1397
1398
}
1399
1400
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1401
	var protoReq TenantDeleteRequest
1402
	var metadata runtime.ServerMetadata
1403
1404
	var (
1405
		val string
1406
		ok  bool
1407
		err error
1408
		_   = err
1409
	)
1410
1411
	val, ok = pathParams["id"]
1412
	if !ok {
1413
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1414
	}
1415
1416
	protoReq.Id, err = runtime.String(val)
1417
	if err != nil {
1418
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1419
	}
1420
1421
	msg, err := server.Delete(ctx, &protoReq)
1422
	return msg, metadata, err
1423
1424
}
1425
1426
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1427
	var protoReq TenantListRequest
1428
	var metadata runtime.ServerMetadata
1429
1430
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1431
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1432
	}
1433
1434
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1435
	return msg, metadata, err
1436
1437
}
1438
1439
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1440
	var protoReq TenantListRequest
1441
	var metadata runtime.ServerMetadata
1442
1443
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1444
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1445
	}
1446
1447
	msg, err := server.List(ctx, &protoReq)
1448
	return msg, metadata, err
1449
1450
}
1451
1452
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1453
// UnaryRPC     :call PermissionServer directly.
1454
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1455
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1456
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1457
1458
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1459
		ctx, cancel := context.WithCancel(req.Context())
1460
		defer cancel()
1461
		var stream runtime.ServerTransportStream
1462
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1463
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1464
		var err error
1465
		var annotatedContext context.Context
1466
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1467
		if err != nil {
1468
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1469
			return
1470
		}
1471
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1472
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1473
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1474
		if err != nil {
1475
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1476
			return
1477
		}
1478
1479
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1480
1481
	})
1482
1483
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1484
		ctx, cancel := context.WithCancel(req.Context())
1485
		defer cancel()
1486
		var stream runtime.ServerTransportStream
1487
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1488
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1489
		var err error
1490
		var annotatedContext context.Context
1491
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1492
		if err != nil {
1493
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1494
			return
1495
		}
1496
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1497
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1498
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1499
		if err != nil {
1500
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1501
			return
1502
		}
1503
1504
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1505
1506
	})
1507
1508
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1509
		ctx, cancel := context.WithCancel(req.Context())
1510
		defer cancel()
1511
		var stream runtime.ServerTransportStream
1512
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1513
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1514
		var err error
1515
		var annotatedContext context.Context
1516
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1517
		if err != nil {
1518
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1519
			return
1520
		}
1521
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1522
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1523
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1524
		if err != nil {
1525
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1526
			return
1527
		}
1528
1529
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1530
1531
	})
1532
1533
	mux.Handle("POST", pattern_Permission_LookupEntities_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1534
		ctx, cancel := context.WithCancel(req.Context())
1535
		defer cancel()
1536
		var stream runtime.ServerTransportStream
1537
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1538
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1539
		var err error
1540
		var annotatedContext context.Context
1541
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntities", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entities"))
1542
		if err != nil {
1543
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1544
			return
1545
		}
1546
		resp, md, err := local_request_Permission_LookupEntities_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1547
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1548
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1549
		if err != nil {
1550
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1551
			return
1552
		}
1553
1554
		forward_Permission_LookupEntities_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1555
1556
	})
1557
1558
	mux.Handle("POST", pattern_Permission_LookupEntitiesStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1559
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1560
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1561
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1562
		return
1563
	})
1564
1565
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1566
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1567
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1568
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1569
		return
1570
	})
1571
1572
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1573
		ctx, cancel := context.WithCancel(req.Context())
1574
		defer cancel()
1575
		var stream runtime.ServerTransportStream
1576
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1577
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1578
		var err error
1579
		var annotatedContext context.Context
1580
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1581
		if err != nil {
1582
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1583
			return
1584
		}
1585
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1586
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1587
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1588
		if err != nil {
1589
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1590
			return
1591
		}
1592
1593
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1594
1595
	})
1596
1597
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1598
		ctx, cancel := context.WithCancel(req.Context())
1599
		defer cancel()
1600
		var stream runtime.ServerTransportStream
1601
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1602
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1603
		var err error
1604
		var annotatedContext context.Context
1605
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1606
		if err != nil {
1607
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1608
			return
1609
		}
1610
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1611
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1612
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1613
		if err != nil {
1614
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1615
			return
1616
		}
1617
1618
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1619
1620
	})
1621
1622
	return nil
1623
}
1624
1625
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1626
// UnaryRPC     :call WatchServer directly.
1627
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1628
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1629
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1630
1631
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1632
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1633
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1634
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1635
		return
1636
	})
1637
1638
	return nil
1639
}
1640
1641
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1642
// UnaryRPC     :call SchemaServer directly.
1643
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1644
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1645
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1646
1647
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1648
		ctx, cancel := context.WithCancel(req.Context())
1649
		defer cancel()
1650
		var stream runtime.ServerTransportStream
1651
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1652
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1653
		var err error
1654
		var annotatedContext context.Context
1655
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1656
		if err != nil {
1657
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1658
			return
1659
		}
1660
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1661
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1662
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1663
		if err != nil {
1664
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1665
			return
1666
		}
1667
1668
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1669
1670
	})
1671
1672
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1673
		ctx, cancel := context.WithCancel(req.Context())
1674
		defer cancel()
1675
		var stream runtime.ServerTransportStream
1676
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1677
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1678
		var err error
1679
		var annotatedContext context.Context
1680
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
1681
		if err != nil {
1682
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1683
			return
1684
		}
1685
		resp, md, err := local_request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1686
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1687
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1688
		if err != nil {
1689
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1690
			return
1691
		}
1692
1693
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1694
1695
	})
1696
1697
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1698
		ctx, cancel := context.WithCancel(req.Context())
1699
		defer cancel()
1700
		var stream runtime.ServerTransportStream
1701
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1702
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1703
		var err error
1704
		var annotatedContext context.Context
1705
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1706
		if err != nil {
1707
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1708
			return
1709
		}
1710
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1711
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1712
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1713
		if err != nil {
1714
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1715
			return
1716
		}
1717
1718
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1719
1720
	})
1721
1722
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1723
		ctx, cancel := context.WithCancel(req.Context())
1724
		defer cancel()
1725
		var stream runtime.ServerTransportStream
1726
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1727
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1728
		var err error
1729
		var annotatedContext context.Context
1730
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
1731
		if err != nil {
1732
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1733
			return
1734
		}
1735
		resp, md, err := local_request_Schema_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1736
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1737
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1738
		if err != nil {
1739
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1740
			return
1741
		}
1742
1743
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1744
1745
	})
1746
1747
	return nil
1748
}
1749
1750
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1751
// UnaryRPC     :call DataServer directly.
1752
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1753
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1754
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1755
1756
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1757
		ctx, cancel := context.WithCancel(req.Context())
1758
		defer cancel()
1759
		var stream runtime.ServerTransportStream
1760
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1761
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1762
		var err error
1763
		var annotatedContext context.Context
1764
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1765
		if err != nil {
1766
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1767
			return
1768
		}
1769
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1770
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1771
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1772
		if err != nil {
1773
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1774
			return
1775
		}
1776
1777
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1778
1779
	})
1780
1781
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1782
		ctx, cancel := context.WithCancel(req.Context())
1783
		defer cancel()
1784
		var stream runtime.ServerTransportStream
1785
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1786
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1787
		var err error
1788
		var annotatedContext context.Context
1789
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1790
		if err != nil {
1791
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1792
			return
1793
		}
1794
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1795
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1796
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1797
		if err != nil {
1798
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1799
			return
1800
		}
1801
1802
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1803
1804
	})
1805
1806
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1807
		ctx, cancel := context.WithCancel(req.Context())
1808
		defer cancel()
1809
		var stream runtime.ServerTransportStream
1810
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1811
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1812
		var err error
1813
		var annotatedContext context.Context
1814
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1815
		if err != nil {
1816
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1817
			return
1818
		}
1819
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1820
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1821
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1822
		if err != nil {
1823
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1824
			return
1825
		}
1826
1827
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1828
1829
	})
1830
1831
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1832
		ctx, cancel := context.WithCancel(req.Context())
1833
		defer cancel()
1834
		var stream runtime.ServerTransportStream
1835
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1836
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1837
		var err error
1838
		var annotatedContext context.Context
1839
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1840
		if err != nil {
1841
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1842
			return
1843
		}
1844
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1845
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1846
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1847
		if err != nil {
1848
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1849
			return
1850
		}
1851
1852
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1853
1854
	})
1855
1856
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1857
		ctx, cancel := context.WithCancel(req.Context())
1858
		defer cancel()
1859
		var stream runtime.ServerTransportStream
1860
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1861
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1862
		var err error
1863
		var annotatedContext context.Context
1864
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1865
		if err != nil {
1866
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1867
			return
1868
		}
1869
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1870
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1871
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1872
		if err != nil {
1873
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1874
			return
1875
		}
1876
1877
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1878
1879
	})
1880
1881
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1882
		ctx, cancel := context.WithCancel(req.Context())
1883
		defer cancel()
1884
		var stream runtime.ServerTransportStream
1885
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1886
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1887
		var err error
1888
		var annotatedContext context.Context
1889
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1890
		if err != nil {
1891
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1892
			return
1893
		}
1894
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1895
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1896
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1897
		if err != nil {
1898
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1899
			return
1900
		}
1901
1902
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1903
1904
	})
1905
1906
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1907
		ctx, cancel := context.WithCancel(req.Context())
1908
		defer cancel()
1909
		var stream runtime.ServerTransportStream
1910
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1911
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1912
		var err error
1913
		var annotatedContext context.Context
1914
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1915
		if err != nil {
1916
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1917
			return
1918
		}
1919
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1920
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1921
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1922
		if err != nil {
1923
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1924
			return
1925
		}
1926
1927
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1928
1929
	})
1930
1931
	return nil
1932
}
1933
1934
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1935
// UnaryRPC     :call BundleServer directly.
1936
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1937
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1938
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1939
1940
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1941
		ctx, cancel := context.WithCancel(req.Context())
1942
		defer cancel()
1943
		var stream runtime.ServerTransportStream
1944
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1945
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1946
		var err error
1947
		var annotatedContext context.Context
1948
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1949
		if err != nil {
1950
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1951
			return
1952
		}
1953
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1954
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1955
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1956
		if err != nil {
1957
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1958
			return
1959
		}
1960
1961
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1962
1963
	})
1964
1965
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1966
		ctx, cancel := context.WithCancel(req.Context())
1967
		defer cancel()
1968
		var stream runtime.ServerTransportStream
1969
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1970
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1971
		var err error
1972
		var annotatedContext context.Context
1973
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
1974
		if err != nil {
1975
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1976
			return
1977
		}
1978
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1979
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1980
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1981
		if err != nil {
1982
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1983
			return
1984
		}
1985
1986
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1987
1988
	})
1989
1990
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1991
		ctx, cancel := context.WithCancel(req.Context())
1992
		defer cancel()
1993
		var stream runtime.ServerTransportStream
1994
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1995
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1996
		var err error
1997
		var annotatedContext context.Context
1998
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
1999
		if err != nil {
2000
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2001
			return
2002
		}
2003
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2004
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2005
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2006
		if err != nil {
2007
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2008
			return
2009
		}
2010
2011
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2012
2013
	})
2014
2015
	return nil
2016
}
2017
2018
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
2019
// UnaryRPC     :call TenancyServer directly.
2020
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
2021
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
2022
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
2023
2024
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2025
		ctx, cancel := context.WithCancel(req.Context())
2026
		defer cancel()
2027
		var stream runtime.ServerTransportStream
2028
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2029
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2030
		var err error
2031
		var annotatedContext context.Context
2032
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2033
		if err != nil {
2034
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2035
			return
2036
		}
2037
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2038
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2039
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2040
		if err != nil {
2041
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2042
			return
2043
		}
2044
2045
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2046
2047
	})
2048
2049
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2050
		ctx, cancel := context.WithCancel(req.Context())
2051
		defer cancel()
2052
		var stream runtime.ServerTransportStream
2053
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2054
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2055
		var err error
2056
		var annotatedContext context.Context
2057
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2058
		if err != nil {
2059
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2060
			return
2061
		}
2062
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2063
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2064
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2065
		if err != nil {
2066
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2067
			return
2068
		}
2069
2070
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2071
2072
	})
2073
2074
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2075
		ctx, cancel := context.WithCancel(req.Context())
2076
		defer cancel()
2077
		var stream runtime.ServerTransportStream
2078
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2079
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2080
		var err error
2081
		var annotatedContext context.Context
2082
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2083
		if err != nil {
2084
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2085
			return
2086
		}
2087
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2088
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2089
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2090
		if err != nil {
2091
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2092
			return
2093
		}
2094
2095
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2096
2097
	})
2098
2099
	return nil
2100
}
2101
2102
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
2103
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2104
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2105
	conn, err := grpc.NewClient(endpoint, opts...)
2106
	if err != nil {
2107
		return err
2108
	}
2109
	defer func() {
2110
		if err != nil {
2111
			if cerr := conn.Close(); cerr != nil {
2112
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2113
			}
2114
			return
2115
		}
2116
		go func() {
2117
			<-ctx.Done()
2118
			if cerr := conn.Close(); cerr != nil {
2119
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2120
			}
2121
		}()
2122
	}()
2123
2124
	return RegisterPermissionHandler(ctx, mux, conn)
2125
}
2126
2127
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
2128
// The handlers forward requests to the grpc endpoint over "conn".
2129
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2130
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
2131
}
2132
2133
// RegisterPermissionHandlerClient registers the http handlers for service Permission
2134
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
2135
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
2136
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2137
// "PermissionClient" to call the correct interceptors.
2138
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
2139
2140
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2141
		ctx, cancel := context.WithCancel(req.Context())
2142
		defer cancel()
2143
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2144
		var err error
2145
		var annotatedContext context.Context
2146
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2147
		if err != nil {
2148
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2149
			return
2150
		}
2151
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2152
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2153
		if err != nil {
2154
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2155
			return
2156
		}
2157
2158
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2159
2160
	})
2161
2162
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2163
		ctx, cancel := context.WithCancel(req.Context())
2164
		defer cancel()
2165
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2166
		var err error
2167
		var annotatedContext context.Context
2168
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2169
		if err != nil {
2170
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2171
			return
2172
		}
2173
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2174
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2175
		if err != nil {
2176
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2177
			return
2178
		}
2179
2180
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2181
2182
	})
2183
2184
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2185
		ctx, cancel := context.WithCancel(req.Context())
2186
		defer cancel()
2187
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2188
		var err error
2189
		var annotatedContext context.Context
2190
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2191
		if err != nil {
2192
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2193
			return
2194
		}
2195
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2196
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2197
		if err != nil {
2198
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2199
			return
2200
		}
2201
2202
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2203
2204
	})
2205
2206
	mux.Handle("POST", pattern_Permission_LookupEntities_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2207
		ctx, cancel := context.WithCancel(req.Context())
2208
		defer cancel()
2209
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2210
		var err error
2211
		var annotatedContext context.Context
2212
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntities", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entities"))
2213
		if err != nil {
2214
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2215
			return
2216
		}
2217
		resp, md, err := request_Permission_LookupEntities_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2218
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2219
		if err != nil {
2220
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2221
			return
2222
		}
2223
2224
		forward_Permission_LookupEntities_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2225
2226
	})
2227
2228
	mux.Handle("POST", pattern_Permission_LookupEntitiesStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2229
		ctx, cancel := context.WithCancel(req.Context())
2230
		defer cancel()
2231
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2232
		var err error
2233
		var annotatedContext context.Context
2234
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntitiesStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entities-stream"))
2235
		if err != nil {
2236
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2237
			return
2238
		}
2239
		resp, md, err := request_Permission_LookupEntitiesStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2240
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2241
		if err != nil {
2242
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2243
			return
2244
		}
2245
2246
		forward_Permission_LookupEntitiesStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2247
2248
	})
2249
2250
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2251
		ctx, cancel := context.WithCancel(req.Context())
2252
		defer cancel()
2253
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2254
		var err error
2255
		var annotatedContext context.Context
2256
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2257
		if err != nil {
2258
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2259
			return
2260
		}
2261
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2262
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2263
		if err != nil {
2264
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2265
			return
2266
		}
2267
2268
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2269
2270
	})
2271
2272
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2273
		ctx, cancel := context.WithCancel(req.Context())
2274
		defer cancel()
2275
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2276
		var err error
2277
		var annotatedContext context.Context
2278
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2279
		if err != nil {
2280
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2281
			return
2282
		}
2283
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2284
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2285
		if err != nil {
2286
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2287
			return
2288
		}
2289
2290
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2291
2292
	})
2293
2294
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2295
		ctx, cancel := context.WithCancel(req.Context())
2296
		defer cancel()
2297
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2298
		var err error
2299
		var annotatedContext context.Context
2300
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2301
		if err != nil {
2302
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2303
			return
2304
		}
2305
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2306
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2307
		if err != nil {
2308
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2309
			return
2310
		}
2311
2312
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2313
2314
	})
2315
2316
	return nil
2317
}
2318
2319
var (
2320
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2321
2322
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2323
2324
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2325
2326
	pattern_Permission_LookupEntities_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entities"}, ""))
2327
2328
	pattern_Permission_LookupEntitiesStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entities-stream"}, ""))
2329
2330
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2331
2332
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2333
2334
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2335
)
2336
2337
var (
2338
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2339
2340
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2341
2342
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2343
2344
	forward_Permission_LookupEntities_0 = runtime.ForwardResponseMessage
2345
2346
	forward_Permission_LookupEntitiesStream_0 = runtime.ForwardResponseStream
2347
2348
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2349
2350
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2351
2352
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2353
)
2354
2355
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2356
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2357
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2358
	conn, err := grpc.NewClient(endpoint, opts...)
2359
	if err != nil {
2360
		return err
2361
	}
2362
	defer func() {
2363
		if err != nil {
2364
			if cerr := conn.Close(); cerr != nil {
2365
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2366
			}
2367
			return
2368
		}
2369
		go func() {
2370
			<-ctx.Done()
2371
			if cerr := conn.Close(); cerr != nil {
2372
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2373
			}
2374
		}()
2375
	}()
2376
2377
	return RegisterWatchHandler(ctx, mux, conn)
2378
}
2379
2380
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2381
// The handlers forward requests to the grpc endpoint over "conn".
2382
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2383
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2384
}
2385
2386
// RegisterWatchHandlerClient registers the http handlers for service Watch
2387
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2388
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2389
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2390
// "WatchClient" to call the correct interceptors.
2391
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2392
2393
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2394
		ctx, cancel := context.WithCancel(req.Context())
2395
		defer cancel()
2396
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2397
		var err error
2398
		var annotatedContext context.Context
2399
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2400
		if err != nil {
2401
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2402
			return
2403
		}
2404
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2405
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2406
		if err != nil {
2407
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2408
			return
2409
		}
2410
2411
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2412
2413
	})
2414
2415
	return nil
2416
}
2417
2418
var (
2419
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2420
)
2421
2422
var (
2423
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2424
)
2425
2426
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2427
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2428
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2429
	conn, err := grpc.NewClient(endpoint, opts...)
2430
	if err != nil {
2431
		return err
2432
	}
2433
	defer func() {
2434
		if err != nil {
2435
			if cerr := conn.Close(); cerr != nil {
2436
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2437
			}
2438
			return
2439
		}
2440
		go func() {
2441
			<-ctx.Done()
2442
			if cerr := conn.Close(); cerr != nil {
2443
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2444
			}
2445
		}()
2446
	}()
2447
2448
	return RegisterSchemaHandler(ctx, mux, conn)
2449
}
2450
2451
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2452
// The handlers forward requests to the grpc endpoint over "conn".
2453
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2454
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2455
}
2456
2457
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2458
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2459
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2460
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2461
// "SchemaClient" to call the correct interceptors.
2462
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2463
2464
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2465
		ctx, cancel := context.WithCancel(req.Context())
2466
		defer cancel()
2467
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2468
		var err error
2469
		var annotatedContext context.Context
2470
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2471
		if err != nil {
2472
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2473
			return
2474
		}
2475
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2476
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2477
		if err != nil {
2478
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2479
			return
2480
		}
2481
2482
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2483
2484
	})
2485
2486
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2487
		ctx, cancel := context.WithCancel(req.Context())
2488
		defer cancel()
2489
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2490
		var err error
2491
		var annotatedContext context.Context
2492
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
2493
		if err != nil {
2494
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2495
			return
2496
		}
2497
		resp, md, err := request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2498
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2499
		if err != nil {
2500
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2501
			return
2502
		}
2503
2504
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2505
2506
	})
2507
2508
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2509
		ctx, cancel := context.WithCancel(req.Context())
2510
		defer cancel()
2511
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2512
		var err error
2513
		var annotatedContext context.Context
2514
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2515
		if err != nil {
2516
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2517
			return
2518
		}
2519
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2520
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2521
		if err != nil {
2522
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2523
			return
2524
		}
2525
2526
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2527
2528
	})
2529
2530
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2531
		ctx, cancel := context.WithCancel(req.Context())
2532
		defer cancel()
2533
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2534
		var err error
2535
		var annotatedContext context.Context
2536
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
2537
		if err != nil {
2538
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2539
			return
2540
		}
2541
		resp, md, err := request_Schema_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2542
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2543
		if err != nil {
2544
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2545
			return
2546
		}
2547
2548
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2549
2550
	})
2551
2552
	return nil
2553
}
2554
2555
var (
2556
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2557
2558
	pattern_Schema_PartialWrite_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "partial-write"}, ""))
2559
2560
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2561
2562
	pattern_Schema_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "list"}, ""))
2563
)
2564
2565
var (
2566
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2567
2568
	forward_Schema_PartialWrite_0 = runtime.ForwardResponseMessage
2569
2570
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2571
2572
	forward_Schema_List_0 = runtime.ForwardResponseMessage
2573
)
2574
2575
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2576
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2577
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2578
	conn, err := grpc.NewClient(endpoint, opts...)
2579
	if err != nil {
2580
		return err
2581
	}
2582
	defer func() {
2583
		if err != nil {
2584
			if cerr := conn.Close(); cerr != nil {
2585
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2586
			}
2587
			return
2588
		}
2589
		go func() {
2590
			<-ctx.Done()
2591
			if cerr := conn.Close(); cerr != nil {
2592
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2593
			}
2594
		}()
2595
	}()
2596
2597
	return RegisterDataHandler(ctx, mux, conn)
2598
}
2599
2600
// RegisterDataHandler registers the http handlers for service Data to "mux".
2601
// The handlers forward requests to the grpc endpoint over "conn".
2602
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2603
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2604
}
2605
2606
// RegisterDataHandlerClient registers the http handlers for service Data
2607
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2608
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2609
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2610
// "DataClient" to call the correct interceptors.
2611
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2612
2613
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2614
		ctx, cancel := context.WithCancel(req.Context())
2615
		defer cancel()
2616
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2617
		var err error
2618
		var annotatedContext context.Context
2619
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2620
		if err != nil {
2621
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2622
			return
2623
		}
2624
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2625
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2626
		if err != nil {
2627
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2628
			return
2629
		}
2630
2631
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2632
2633
	})
2634
2635
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2636
		ctx, cancel := context.WithCancel(req.Context())
2637
		defer cancel()
2638
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2639
		var err error
2640
		var annotatedContext context.Context
2641
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2642
		if err != nil {
2643
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2644
			return
2645
		}
2646
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2647
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2648
		if err != nil {
2649
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2650
			return
2651
		}
2652
2653
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2654
2655
	})
2656
2657
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2658
		ctx, cancel := context.WithCancel(req.Context())
2659
		defer cancel()
2660
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2661
		var err error
2662
		var annotatedContext context.Context
2663
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2664
		if err != nil {
2665
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2666
			return
2667
		}
2668
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2669
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2670
		if err != nil {
2671
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2672
			return
2673
		}
2674
2675
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2676
2677
	})
2678
2679
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2680
		ctx, cancel := context.WithCancel(req.Context())
2681
		defer cancel()
2682
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2683
		var err error
2684
		var annotatedContext context.Context
2685
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2686
		if err != nil {
2687
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2688
			return
2689
		}
2690
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2691
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2692
		if err != nil {
2693
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2694
			return
2695
		}
2696
2697
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2698
2699
	})
2700
2701
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2702
		ctx, cancel := context.WithCancel(req.Context())
2703
		defer cancel()
2704
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2705
		var err error
2706
		var annotatedContext context.Context
2707
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2708
		if err != nil {
2709
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2710
			return
2711
		}
2712
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2713
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2714
		if err != nil {
2715
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2716
			return
2717
		}
2718
2719
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2720
2721
	})
2722
2723
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2724
		ctx, cancel := context.WithCancel(req.Context())
2725
		defer cancel()
2726
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2727
		var err error
2728
		var annotatedContext context.Context
2729
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2730
		if err != nil {
2731
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2732
			return
2733
		}
2734
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2735
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2736
		if err != nil {
2737
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2738
			return
2739
		}
2740
2741
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2742
2743
	})
2744
2745
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2746
		ctx, cancel := context.WithCancel(req.Context())
2747
		defer cancel()
2748
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2749
		var err error
2750
		var annotatedContext context.Context
2751
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2752
		if err != nil {
2753
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2754
			return
2755
		}
2756
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2757
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2758
		if err != nil {
2759
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2760
			return
2761
		}
2762
2763
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2764
2765
	})
2766
2767
	return nil
2768
}
2769
2770
var (
2771
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2772
2773
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2774
2775
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2776
2777
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2778
2779
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2780
2781
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2782
2783
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2784
)
2785
2786
var (
2787
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2788
2789
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2790
2791
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2792
2793
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2794
2795
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2796
2797
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2798
2799
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2800
)
2801
2802
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2803
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2804
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2805
	conn, err := grpc.NewClient(endpoint, opts...)
2806
	if err != nil {
2807
		return err
2808
	}
2809
	defer func() {
2810
		if err != nil {
2811
			if cerr := conn.Close(); cerr != nil {
2812
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2813
			}
2814
			return
2815
		}
2816
		go func() {
2817
			<-ctx.Done()
2818
			if cerr := conn.Close(); cerr != nil {
2819
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2820
			}
2821
		}()
2822
	}()
2823
2824
	return RegisterBundleHandler(ctx, mux, conn)
2825
}
2826
2827
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2828
// The handlers forward requests to the grpc endpoint over "conn".
2829
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2830
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2831
}
2832
2833
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2834
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2835
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2836
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2837
// "BundleClient" to call the correct interceptors.
2838
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2839
2840
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2841
		ctx, cancel := context.WithCancel(req.Context())
2842
		defer cancel()
2843
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2844
		var err error
2845
		var annotatedContext context.Context
2846
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2847
		if err != nil {
2848
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2849
			return
2850
		}
2851
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2852
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2853
		if err != nil {
2854
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2855
			return
2856
		}
2857
2858
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2859
2860
	})
2861
2862
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2863
		ctx, cancel := context.WithCancel(req.Context())
2864
		defer cancel()
2865
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2866
		var err error
2867
		var annotatedContext context.Context
2868
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2869
		if err != nil {
2870
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2871
			return
2872
		}
2873
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2874
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2875
		if err != nil {
2876
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2877
			return
2878
		}
2879
2880
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2881
2882
	})
2883
2884
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2885
		ctx, cancel := context.WithCancel(req.Context())
2886
		defer cancel()
2887
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2888
		var err error
2889
		var annotatedContext context.Context
2890
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2891
		if err != nil {
2892
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2893
			return
2894
		}
2895
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2896
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2897
		if err != nil {
2898
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2899
			return
2900
		}
2901
2902
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2903
2904
	})
2905
2906
	return nil
2907
}
2908
2909
var (
2910
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2911
2912
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2913
2914
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2915
)
2916
2917
var (
2918
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2919
2920
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2921
2922
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2923
)
2924
2925
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2926
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2927
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2928
	conn, err := grpc.NewClient(endpoint, opts...)
2929
	if err != nil {
2930
		return err
2931
	}
2932
	defer func() {
2933
		if err != nil {
2934
			if cerr := conn.Close(); cerr != nil {
2935
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2936
			}
2937
			return
2938
		}
2939
		go func() {
2940
			<-ctx.Done()
2941
			if cerr := conn.Close(); cerr != nil {
2942
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2943
			}
2944
		}()
2945
	}()
2946
2947
	return RegisterTenancyHandler(ctx, mux, conn)
2948
}
2949
2950
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2951
// The handlers forward requests to the grpc endpoint over "conn".
2952
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2953
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2954
}
2955
2956
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2957
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2958
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2959
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2960
// "TenancyClient" to call the correct interceptors.
2961
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2962
2963
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2964
		ctx, cancel := context.WithCancel(req.Context())
2965
		defer cancel()
2966
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2967
		var err error
2968
		var annotatedContext context.Context
2969
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2970
		if err != nil {
2971
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2972
			return
2973
		}
2974
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2975
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2976
		if err != nil {
2977
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2978
			return
2979
		}
2980
2981
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2982
2983
	})
2984
2985
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2986
		ctx, cancel := context.WithCancel(req.Context())
2987
		defer cancel()
2988
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2989
		var err error
2990
		var annotatedContext context.Context
2991
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2992
		if err != nil {
2993
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2994
			return
2995
		}
2996
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2997
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2998
		if err != nil {
2999
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
3000
			return
3001
		}
3002
3003
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
3004
3005
	})
3006
3007
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
3008
		ctx, cancel := context.WithCancel(req.Context())
3009
		defer cancel()
3010
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
3011
		var err error
3012
		var annotatedContext context.Context
3013
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
3014
		if err != nil {
3015
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
3016
			return
3017
		}
3018
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
3019
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
3020
		if err != nil {
3021
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
3022
			return
3023
		}
3024
3025
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
3026
3027
	})
3028
3029
	return nil
3030
}
3031
3032
var (
3033
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
3034
3035
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
3036
3037
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
3038
)
3039
3040
var (
3041
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
3042
3043
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
3044
3045
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
3046
)
3047