Passed
Pull Request — master (#1681)
by
unknown
04:00
created

basev1.local_request_Bundle_Read_0   A

Complexity

Conditions 5

Size

Total Lines 27
Code Lines 18

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 5
eloc 18
nop 5
dl 0
loc 27
rs 9.0333
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq PermissionCheckRequest
36
	var metadata runtime.ServerMetadata
37
38
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
39
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
40
	}
41
42
	var (
43
		val string
44
		ok  bool
45
		err error
46
		_   = err
47
	)
48
49
	val, ok = pathParams["tenant_id"]
50
	if !ok {
51
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
52
	}
53
54
	protoReq.TenantId, err = runtime.String(val)
55
	if err != nil {
56
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
57
	}
58
59
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
60
	return msg, metadata, err
61
62
}
63
64
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
65
	var protoReq PermissionCheckRequest
66
	var metadata runtime.ServerMetadata
67
68
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
69
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
70
	}
71
72
	var (
73
		val string
74
		ok  bool
75
		err error
76
		_   = err
77
	)
78
79
	val, ok = pathParams["tenant_id"]
80
	if !ok {
81
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
82
	}
83
84
	protoReq.TenantId, err = runtime.String(val)
85
	if err != nil {
86
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
87
	}
88
89
	msg, err := server.Check(ctx, &protoReq)
90
	return msg, metadata, err
91
92
}
93
94
func request_Permission_BulkCheck_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
95
	var protoReq BulkPermissionCheckRequest
96
	var metadata runtime.ServerMetadata
97
98
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
99
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
100
	}
101
102
	var (
103
		val string
104
		ok  bool
105
		err error
106
		_   = err
107
	)
108
109
	val, ok = pathParams["tenant_id"]
110
	if !ok {
111
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
112
	}
113
114
	protoReq.TenantId, err = runtime.String(val)
115
	if err != nil {
116
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
117
	}
118
119
	msg, err := client.BulkCheck(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
120
	return msg, metadata, err
121
122
}
123
124
func local_request_Permission_BulkCheck_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
125
	var protoReq BulkPermissionCheckRequest
126
	var metadata runtime.ServerMetadata
127
128
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
129
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
130
	}
131
132
	var (
133
		val string
134
		ok  bool
135
		err error
136
		_   = err
137
	)
138
139
	val, ok = pathParams["tenant_id"]
140
	if !ok {
141
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
142
	}
143
144
	protoReq.TenantId, err = runtime.String(val)
145
	if err != nil {
146
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
147
	}
148
149
	msg, err := server.BulkCheck(ctx, &protoReq)
150
	return msg, metadata, err
151
152
}
153
154
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
155
	var protoReq PermissionExpandRequest
156
	var metadata runtime.ServerMetadata
157
158
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
160
	}
161
162
	var (
163
		val string
164
		ok  bool
165
		err error
166
		_   = err
167
	)
168
169
	val, ok = pathParams["tenant_id"]
170
	if !ok {
171
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
172
	}
173
174
	protoReq.TenantId, err = runtime.String(val)
175
	if err != nil {
176
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
177
	}
178
179
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
180
	return msg, metadata, err
181
182
}
183
184
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
185
	var protoReq PermissionExpandRequest
186
	var metadata runtime.ServerMetadata
187
188
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
189
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
190
	}
191
192
	var (
193
		val string
194
		ok  bool
195
		err error
196
		_   = err
197
	)
198
199
	val, ok = pathParams["tenant_id"]
200
	if !ok {
201
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
202
	}
203
204
	protoReq.TenantId, err = runtime.String(val)
205
	if err != nil {
206
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
207
	}
208
209
	msg, err := server.Expand(ctx, &protoReq)
210
	return msg, metadata, err
211
212
}
213
214
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
215
	var protoReq PermissionLookupEntityRequest
216
	var metadata runtime.ServerMetadata
217
218
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
219
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
220
	}
221
222
	var (
223
		val string
224
		ok  bool
225
		err error
226
		_   = err
227
	)
228
229
	val, ok = pathParams["tenant_id"]
230
	if !ok {
231
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
232
	}
233
234
	protoReq.TenantId, err = runtime.String(val)
235
	if err != nil {
236
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
237
	}
238
239
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
240
	return msg, metadata, err
241
242
}
243
244
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
245
	var protoReq PermissionLookupEntityRequest
246
	var metadata runtime.ServerMetadata
247
248
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
250
	}
251
252
	var (
253
		val string
254
		ok  bool
255
		err error
256
		_   = err
257
	)
258
259
	val, ok = pathParams["tenant_id"]
260
	if !ok {
261
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
262
	}
263
264
	protoReq.TenantId, err = runtime.String(val)
265
	if err != nil {
266
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
267
	}
268
269
	msg, err := server.LookupEntity(ctx, &protoReq)
270
	return msg, metadata, err
271
272
}
273
274
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
275
	var protoReq PermissionLookupEntityRequest
276
	var metadata runtime.ServerMetadata
277
278
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
279
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
280
	}
281
282
	var (
283
		val string
284
		ok  bool
285
		err error
286
		_   = err
287
	)
288
289
	val, ok = pathParams["tenant_id"]
290
	if !ok {
291
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
292
	}
293
294
	protoReq.TenantId, err = runtime.String(val)
295
	if err != nil {
296
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
297
	}
298
299
	stream, err := client.LookupEntityStream(ctx, &protoReq)
300
	if err != nil {
301
		return nil, metadata, err
302
	}
303
	header, err := stream.Header()
304
	if err != nil {
305
		return nil, metadata, err
306
	}
307
	metadata.HeaderMD = header
308
	return stream, metadata, nil
309
310
}
311
312
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
313
	var protoReq PermissionLookupSubjectRequest
314
	var metadata runtime.ServerMetadata
315
316
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
317
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
318
	}
319
320
	var (
321
		val string
322
		ok  bool
323
		err error
324
		_   = err
325
	)
326
327
	val, ok = pathParams["tenant_id"]
328
	if !ok {
329
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
330
	}
331
332
	protoReq.TenantId, err = runtime.String(val)
333
	if err != nil {
334
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
335
	}
336
337
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
338
	return msg, metadata, err
339
340
}
341
342
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
343
	var protoReq PermissionLookupSubjectRequest
344
	var metadata runtime.ServerMetadata
345
346
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
347
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
348
	}
349
350
	var (
351
		val string
352
		ok  bool
353
		err error
354
		_   = err
355
	)
356
357
	val, ok = pathParams["tenant_id"]
358
	if !ok {
359
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
360
	}
361
362
	protoReq.TenantId, err = runtime.String(val)
363
	if err != nil {
364
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
365
	}
366
367
	msg, err := server.LookupSubject(ctx, &protoReq)
368
	return msg, metadata, err
369
370
}
371
372
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
373
	var protoReq PermissionSubjectPermissionRequest
374
	var metadata runtime.ServerMetadata
375
376
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
377
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
378
	}
379
380
	var (
381
		val string
382
		ok  bool
383
		err error
384
		_   = err
385
	)
386
387
	val, ok = pathParams["tenant_id"]
388
	if !ok {
389
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
390
	}
391
392
	protoReq.TenantId, err = runtime.String(val)
393
	if err != nil {
394
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
395
	}
396
397
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
398
	return msg, metadata, err
399
400
}
401
402
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
403
	var protoReq PermissionSubjectPermissionRequest
404
	var metadata runtime.ServerMetadata
405
406
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
407
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
408
	}
409
410
	var (
411
		val string
412
		ok  bool
413
		err error
414
		_   = err
415
	)
416
417
	val, ok = pathParams["tenant_id"]
418
	if !ok {
419
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
420
	}
421
422
	protoReq.TenantId, err = runtime.String(val)
423
	if err != nil {
424
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
425
	}
426
427
	msg, err := server.SubjectPermission(ctx, &protoReq)
428
	return msg, metadata, err
429
430
}
431
432
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
433
	var protoReq WatchRequest
434
	var metadata runtime.ServerMetadata
435
436
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
437
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
438
	}
439
440
	var (
441
		val string
442
		ok  bool
443
		err error
444
		_   = err
445
	)
446
447
	val, ok = pathParams["tenant_id"]
448
	if !ok {
449
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
450
	}
451
452
	protoReq.TenantId, err = runtime.String(val)
453
	if err != nil {
454
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
455
	}
456
457
	stream, err := client.Watch(ctx, &protoReq)
458
	if err != nil {
459
		return nil, metadata, err
460
	}
461
	header, err := stream.Header()
462
	if err != nil {
463
		return nil, metadata, err
464
	}
465
	metadata.HeaderMD = header
466
	return stream, metadata, nil
467
468
}
469
470
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
471
	var protoReq SchemaWriteRequest
472
	var metadata runtime.ServerMetadata
473
474
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
475
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
476
	}
477
478
	var (
479
		val string
480
		ok  bool
481
		err error
482
		_   = err
483
	)
484
485
	val, ok = pathParams["tenant_id"]
486
	if !ok {
487
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
488
	}
489
490
	protoReq.TenantId, err = runtime.String(val)
491
	if err != nil {
492
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
493
	}
494
495
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
496
	return msg, metadata, err
497
498
}
499
500
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
501
	var protoReq SchemaWriteRequest
502
	var metadata runtime.ServerMetadata
503
504
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
505
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
506
	}
507
508
	var (
509
		val string
510
		ok  bool
511
		err error
512
		_   = err
513
	)
514
515
	val, ok = pathParams["tenant_id"]
516
	if !ok {
517
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
518
	}
519
520
	protoReq.TenantId, err = runtime.String(val)
521
	if err != nil {
522
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
523
	}
524
525
	msg, err := server.Write(ctx, &protoReq)
526
	return msg, metadata, err
527
528
}
529
530
func request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
531
	var protoReq SchemaPartialWriteRequest
532
	var metadata runtime.ServerMetadata
533
534
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
535
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
536
	}
537
538
	var (
539
		val string
540
		ok  bool
541
		err error
542
		_   = err
543
	)
544
545
	val, ok = pathParams["tenant_id"]
546
	if !ok {
547
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
548
	}
549
550
	protoReq.TenantId, err = runtime.String(val)
551
	if err != nil {
552
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
553
	}
554
555
	msg, err := client.PartialWrite(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
556
	return msg, metadata, err
557
558
}
559
560
func local_request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
561
	var protoReq SchemaPartialWriteRequest
562
	var metadata runtime.ServerMetadata
563
564
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
565
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
566
	}
567
568
	var (
569
		val string
570
		ok  bool
571
		err error
572
		_   = err
573
	)
574
575
	val, ok = pathParams["tenant_id"]
576
	if !ok {
577
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
578
	}
579
580
	protoReq.TenantId, err = runtime.String(val)
581
	if err != nil {
582
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
583
	}
584
585
	msg, err := server.PartialWrite(ctx, &protoReq)
586
	return msg, metadata, err
587
588
}
589
590
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
591
	var protoReq SchemaReadRequest
592
	var metadata runtime.ServerMetadata
593
594
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
595
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
596
	}
597
598
	var (
599
		val string
600
		ok  bool
601
		err error
602
		_   = err
603
	)
604
605
	val, ok = pathParams["tenant_id"]
606
	if !ok {
607
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
608
	}
609
610
	protoReq.TenantId, err = runtime.String(val)
611
	if err != nil {
612
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
613
	}
614
615
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
616
	return msg, metadata, err
617
618
}
619
620
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
621
	var protoReq SchemaReadRequest
622
	var metadata runtime.ServerMetadata
623
624
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
625
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
626
	}
627
628
	var (
629
		val string
630
		ok  bool
631
		err error
632
		_   = err
633
	)
634
635
	val, ok = pathParams["tenant_id"]
636
	if !ok {
637
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
638
	}
639
640
	protoReq.TenantId, err = runtime.String(val)
641
	if err != nil {
642
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
643
	}
644
645
	msg, err := server.Read(ctx, &protoReq)
646
	return msg, metadata, err
647
648
}
649
650
func request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
651
	var protoReq SchemaListRequest
652
	var metadata runtime.ServerMetadata
653
654
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
655
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
656
	}
657
658
	var (
659
		val string
660
		ok  bool
661
		err error
662
		_   = err
663
	)
664
665
	val, ok = pathParams["tenant_id"]
666
	if !ok {
667
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
668
	}
669
670
	protoReq.TenantId, err = runtime.String(val)
671
	if err != nil {
672
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
673
	}
674
675
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
676
	return msg, metadata, err
677
678
}
679
680
func local_request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
681
	var protoReq SchemaListRequest
682
	var metadata runtime.ServerMetadata
683
684
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
685
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
686
	}
687
688
	var (
689
		val string
690
		ok  bool
691
		err error
692
		_   = err
693
	)
694
695
	val, ok = pathParams["tenant_id"]
696
	if !ok {
697
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
698
	}
699
700
	protoReq.TenantId, err = runtime.String(val)
701
	if err != nil {
702
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
703
	}
704
705
	msg, err := server.List(ctx, &protoReq)
706
	return msg, metadata, err
707
708
}
709
710
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
711
	var protoReq DataWriteRequest
712
	var metadata runtime.ServerMetadata
713
714
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
715
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
716
	}
717
718
	var (
719
		val string
720
		ok  bool
721
		err error
722
		_   = err
723
	)
724
725
	val, ok = pathParams["tenant_id"]
726
	if !ok {
727
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
728
	}
729
730
	protoReq.TenantId, err = runtime.String(val)
731
	if err != nil {
732
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
733
	}
734
735
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
736
	return msg, metadata, err
737
738
}
739
740
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
741
	var protoReq DataWriteRequest
742
	var metadata runtime.ServerMetadata
743
744
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
745
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
746
	}
747
748
	var (
749
		val string
750
		ok  bool
751
		err error
752
		_   = err
753
	)
754
755
	val, ok = pathParams["tenant_id"]
756
	if !ok {
757
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
758
	}
759
760
	protoReq.TenantId, err = runtime.String(val)
761
	if err != nil {
762
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
763
	}
764
765
	msg, err := server.Write(ctx, &protoReq)
766
	return msg, metadata, err
767
768
}
769
770
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
771
	var protoReq RelationshipWriteRequest
772
	var metadata runtime.ServerMetadata
773
774
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
775
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
776
	}
777
778
	var (
779
		val string
780
		ok  bool
781
		err error
782
		_   = err
783
	)
784
785
	val, ok = pathParams["tenant_id"]
786
	if !ok {
787
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
788
	}
789
790
	protoReq.TenantId, err = runtime.String(val)
791
	if err != nil {
792
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
793
	}
794
795
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
796
	return msg, metadata, err
797
798
}
799
800
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
801
	var protoReq RelationshipWriteRequest
802
	var metadata runtime.ServerMetadata
803
804
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
805
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
806
	}
807
808
	var (
809
		val string
810
		ok  bool
811
		err error
812
		_   = err
813
	)
814
815
	val, ok = pathParams["tenant_id"]
816
	if !ok {
817
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
818
	}
819
820
	protoReq.TenantId, err = runtime.String(val)
821
	if err != nil {
822
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
823
	}
824
825
	msg, err := server.WriteRelationships(ctx, &protoReq)
826
	return msg, metadata, err
827
828
}
829
830
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
831
	var protoReq RelationshipReadRequest
832
	var metadata runtime.ServerMetadata
833
834
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
835
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
836
	}
837
838
	var (
839
		val string
840
		ok  bool
841
		err error
842
		_   = err
843
	)
844
845
	val, ok = pathParams["tenant_id"]
846
	if !ok {
847
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
848
	}
849
850
	protoReq.TenantId, err = runtime.String(val)
851
	if err != nil {
852
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
853
	}
854
855
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
856
	return msg, metadata, err
857
858
}
859
860
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
861
	var protoReq RelationshipReadRequest
862
	var metadata runtime.ServerMetadata
863
864
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
865
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
866
	}
867
868
	var (
869
		val string
870
		ok  bool
871
		err error
872
		_   = err
873
	)
874
875
	val, ok = pathParams["tenant_id"]
876
	if !ok {
877
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
878
	}
879
880
	protoReq.TenantId, err = runtime.String(val)
881
	if err != nil {
882
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
883
	}
884
885
	msg, err := server.ReadRelationships(ctx, &protoReq)
886
	return msg, metadata, err
887
888
}
889
890
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
891
	var protoReq AttributeReadRequest
892
	var metadata runtime.ServerMetadata
893
894
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
895
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
896
	}
897
898
	var (
899
		val string
900
		ok  bool
901
		err error
902
		_   = err
903
	)
904
905
	val, ok = pathParams["tenant_id"]
906
	if !ok {
907
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
908
	}
909
910
	protoReq.TenantId, err = runtime.String(val)
911
	if err != nil {
912
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
913
	}
914
915
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
916
	return msg, metadata, err
917
918
}
919
920
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
921
	var protoReq AttributeReadRequest
922
	var metadata runtime.ServerMetadata
923
924
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
925
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
926
	}
927
928
	var (
929
		val string
930
		ok  bool
931
		err error
932
		_   = err
933
	)
934
935
	val, ok = pathParams["tenant_id"]
936
	if !ok {
937
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
938
	}
939
940
	protoReq.TenantId, err = runtime.String(val)
941
	if err != nil {
942
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
943
	}
944
945
	msg, err := server.ReadAttributes(ctx, &protoReq)
946
	return msg, metadata, err
947
948
}
949
950
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
951
	var protoReq DataDeleteRequest
952
	var metadata runtime.ServerMetadata
953
954
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
955
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
956
	}
957
958
	var (
959
		val string
960
		ok  bool
961
		err error
962
		_   = err
963
	)
964
965
	val, ok = pathParams["tenant_id"]
966
	if !ok {
967
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
968
	}
969
970
	protoReq.TenantId, err = runtime.String(val)
971
	if err != nil {
972
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
973
	}
974
975
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
976
	return msg, metadata, err
977
978
}
979
980
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
981
	var protoReq DataDeleteRequest
982
	var metadata runtime.ServerMetadata
983
984
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
985
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
986
	}
987
988
	var (
989
		val string
990
		ok  bool
991
		err error
992
		_   = err
993
	)
994
995
	val, ok = pathParams["tenant_id"]
996
	if !ok {
997
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
998
	}
999
1000
	protoReq.TenantId, err = runtime.String(val)
1001
	if err != nil {
1002
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1003
	}
1004
1005
	msg, err := server.Delete(ctx, &protoReq)
1006
	return msg, metadata, err
1007
1008
}
1009
1010
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1011
	var protoReq RelationshipDeleteRequest
1012
	var metadata runtime.ServerMetadata
1013
1014
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1015
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1016
	}
1017
1018
	var (
1019
		val string
1020
		ok  bool
1021
		err error
1022
		_   = err
1023
	)
1024
1025
	val, ok = pathParams["tenant_id"]
1026
	if !ok {
1027
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1028
	}
1029
1030
	protoReq.TenantId, err = runtime.String(val)
1031
	if err != nil {
1032
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1033
	}
1034
1035
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1036
	return msg, metadata, err
1037
1038
}
1039
1040
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1041
	var protoReq RelationshipDeleteRequest
1042
	var metadata runtime.ServerMetadata
1043
1044
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1045
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1046
	}
1047
1048
	var (
1049
		val string
1050
		ok  bool
1051
		err error
1052
		_   = err
1053
	)
1054
1055
	val, ok = pathParams["tenant_id"]
1056
	if !ok {
1057
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1058
	}
1059
1060
	protoReq.TenantId, err = runtime.String(val)
1061
	if err != nil {
1062
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1063
	}
1064
1065
	msg, err := server.DeleteRelationships(ctx, &protoReq)
1066
	return msg, metadata, err
1067
1068
}
1069
1070
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1071
	var protoReq BundleRunRequest
1072
	var metadata runtime.ServerMetadata
1073
1074
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1075
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1076
	}
1077
1078
	var (
1079
		val string
1080
		ok  bool
1081
		err error
1082
		_   = err
1083
	)
1084
1085
	val, ok = pathParams["tenant_id"]
1086
	if !ok {
1087
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1088
	}
1089
1090
	protoReq.TenantId, err = runtime.String(val)
1091
	if err != nil {
1092
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1093
	}
1094
1095
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1096
	return msg, metadata, err
1097
1098
}
1099
1100
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1101
	var protoReq BundleRunRequest
1102
	var metadata runtime.ServerMetadata
1103
1104
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1105
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1106
	}
1107
1108
	var (
1109
		val string
1110
		ok  bool
1111
		err error
1112
		_   = err
1113
	)
1114
1115
	val, ok = pathParams["tenant_id"]
1116
	if !ok {
1117
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1118
	}
1119
1120
	protoReq.TenantId, err = runtime.String(val)
1121
	if err != nil {
1122
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1123
	}
1124
1125
	msg, err := server.RunBundle(ctx, &protoReq)
1126
	return msg, metadata, err
1127
1128
}
1129
1130
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1131
	var protoReq BundleWriteRequest
1132
	var metadata runtime.ServerMetadata
1133
1134
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1135
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1136
	}
1137
1138
	var (
1139
		val string
1140
		ok  bool
1141
		err error
1142
		_   = err
1143
	)
1144
1145
	val, ok = pathParams["tenant_id"]
1146
	if !ok {
1147
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1148
	}
1149
1150
	protoReq.TenantId, err = runtime.String(val)
1151
	if err != nil {
1152
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1153
	}
1154
1155
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1156
	return msg, metadata, err
1157
1158
}
1159
1160
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1161
	var protoReq BundleWriteRequest
1162
	var metadata runtime.ServerMetadata
1163
1164
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1165
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1166
	}
1167
1168
	var (
1169
		val string
1170
		ok  bool
1171
		err error
1172
		_   = err
1173
	)
1174
1175
	val, ok = pathParams["tenant_id"]
1176
	if !ok {
1177
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1178
	}
1179
1180
	protoReq.TenantId, err = runtime.String(val)
1181
	if err != nil {
1182
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1183
	}
1184
1185
	msg, err := server.Write(ctx, &protoReq)
1186
	return msg, metadata, err
1187
1188
}
1189
1190
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1191
	var protoReq BundleReadRequest
1192
	var metadata runtime.ServerMetadata
1193
1194
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1195
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1196
	}
1197
1198
	var (
1199
		val string
1200
		ok  bool
1201
		err error
1202
		_   = err
1203
	)
1204
1205
	val, ok = pathParams["tenant_id"]
1206
	if !ok {
1207
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1208
	}
1209
1210
	protoReq.TenantId, err = runtime.String(val)
1211
	if err != nil {
1212
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1213
	}
1214
1215
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1216
	return msg, metadata, err
1217
1218
}
1219
1220
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1221
	var protoReq BundleReadRequest
1222
	var metadata runtime.ServerMetadata
1223
1224
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1225
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1226
	}
1227
1228
	var (
1229
		val string
1230
		ok  bool
1231
		err error
1232
		_   = err
1233
	)
1234
1235
	val, ok = pathParams["tenant_id"]
1236
	if !ok {
1237
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1238
	}
1239
1240
	protoReq.TenantId, err = runtime.String(val)
1241
	if err != nil {
1242
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1243
	}
1244
1245
	msg, err := server.Read(ctx, &protoReq)
1246
	return msg, metadata, err
1247
1248
}
1249
1250
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1251
	var protoReq BundleDeleteRequest
1252
	var metadata runtime.ServerMetadata
1253
1254
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1255
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1256
	}
1257
1258
	var (
1259
		val string
1260
		ok  bool
1261
		err error
1262
		_   = err
1263
	)
1264
1265
	val, ok = pathParams["tenant_id"]
1266
	if !ok {
1267
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1268
	}
1269
1270
	protoReq.TenantId, err = runtime.String(val)
1271
	if err != nil {
1272
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1273
	}
1274
1275
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1276
	return msg, metadata, err
1277
1278
}
1279
1280
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1281
	var protoReq BundleDeleteRequest
1282
	var metadata runtime.ServerMetadata
1283
1284
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1285
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1286
	}
1287
1288
	var (
1289
		val string
1290
		ok  bool
1291
		err error
1292
		_   = err
1293
	)
1294
1295
	val, ok = pathParams["tenant_id"]
1296
	if !ok {
1297
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1298
	}
1299
1300
	protoReq.TenantId, err = runtime.String(val)
1301
	if err != nil {
1302
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1303
	}
1304
1305
	msg, err := server.Delete(ctx, &protoReq)
1306
	return msg, metadata, err
1307
1308
}
1309
1310
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1311
	var protoReq TenantCreateRequest
1312
	var metadata runtime.ServerMetadata
1313
1314
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1315
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1316
	}
1317
1318
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1319
	return msg, metadata, err
1320
1321
}
1322
1323
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1324
	var protoReq TenantCreateRequest
1325
	var metadata runtime.ServerMetadata
1326
1327
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1328
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1329
	}
1330
1331
	msg, err := server.Create(ctx, &protoReq)
1332
	return msg, metadata, err
1333
1334
}
1335
1336
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1337
	var protoReq TenantDeleteRequest
1338
	var metadata runtime.ServerMetadata
1339
1340
	var (
1341
		val string
1342
		ok  bool
1343
		err error
1344
		_   = err
1345
	)
1346
1347
	val, ok = pathParams["id"]
1348
	if !ok {
1349
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1350
	}
1351
1352
	protoReq.Id, err = runtime.String(val)
1353
	if err != nil {
1354
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1355
	}
1356
1357
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1358
	return msg, metadata, err
1359
1360
}
1361
1362
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1363
	var protoReq TenantDeleteRequest
1364
	var metadata runtime.ServerMetadata
1365
1366
	var (
1367
		val string
1368
		ok  bool
1369
		err error
1370
		_   = err
1371
	)
1372
1373
	val, ok = pathParams["id"]
1374
	if !ok {
1375
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1376
	}
1377
1378
	protoReq.Id, err = runtime.String(val)
1379
	if err != nil {
1380
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1381
	}
1382
1383
	msg, err := server.Delete(ctx, &protoReq)
1384
	return msg, metadata, err
1385
1386
}
1387
1388
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1389
	var protoReq TenantListRequest
1390
	var metadata runtime.ServerMetadata
1391
1392
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1393
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1394
	}
1395
1396
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1397
	return msg, metadata, err
1398
1399
}
1400
1401
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1402
	var protoReq TenantListRequest
1403
	var metadata runtime.ServerMetadata
1404
1405
	if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil && err != io.EOF {
1406
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1407
	}
1408
1409
	msg, err := server.List(ctx, &protoReq)
1410
	return msg, metadata, err
1411
1412
}
1413
1414
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1415
// UnaryRPC     :call PermissionServer directly.
1416
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1417
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1418
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1419
1420
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1421
		ctx, cancel := context.WithCancel(req.Context())
1422
		defer cancel()
1423
		var stream runtime.ServerTransportStream
1424
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1425
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1426
		var err error
1427
		var annotatedContext context.Context
1428
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1429
		if err != nil {
1430
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1431
			return
1432
		}
1433
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1434
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1435
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1436
		if err != nil {
1437
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1438
			return
1439
		}
1440
1441
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1442
1443
	})
1444
1445
	mux.Handle("POST", pattern_Permission_BulkCheck_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1446
		ctx, cancel := context.WithCancel(req.Context())
1447
		defer cancel()
1448
		var stream runtime.ServerTransportStream
1449
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1450
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1451
		var err error
1452
		var annotatedContext context.Context
1453
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/BulkCheck", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/bulk-check"))
1454
		if err != nil {
1455
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1456
			return
1457
		}
1458
		resp, md, err := local_request_Permission_BulkCheck_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1459
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1460
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1461
		if err != nil {
1462
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1463
			return
1464
		}
1465
1466
		forward_Permission_BulkCheck_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1467
1468
	})
1469
1470
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1471
		ctx, cancel := context.WithCancel(req.Context())
1472
		defer cancel()
1473
		var stream runtime.ServerTransportStream
1474
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1475
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1476
		var err error
1477
		var annotatedContext context.Context
1478
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1479
		if err != nil {
1480
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1481
			return
1482
		}
1483
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1484
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1485
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1486
		if err != nil {
1487
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1488
			return
1489
		}
1490
1491
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1492
1493
	})
1494
1495
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1496
		ctx, cancel := context.WithCancel(req.Context())
1497
		defer cancel()
1498
		var stream runtime.ServerTransportStream
1499
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1500
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1501
		var err error
1502
		var annotatedContext context.Context
1503
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1504
		if err != nil {
1505
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1506
			return
1507
		}
1508
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1509
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1510
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1511
		if err != nil {
1512
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1513
			return
1514
		}
1515
1516
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1517
1518
	})
1519
1520
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1521
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1522
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1523
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1524
		return
1525
	})
1526
1527
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1528
		ctx, cancel := context.WithCancel(req.Context())
1529
		defer cancel()
1530
		var stream runtime.ServerTransportStream
1531
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1532
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1533
		var err error
1534
		var annotatedContext context.Context
1535
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1536
		if err != nil {
1537
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1538
			return
1539
		}
1540
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1541
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1542
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1543
		if err != nil {
1544
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1545
			return
1546
		}
1547
1548
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1549
1550
	})
1551
1552
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1553
		ctx, cancel := context.WithCancel(req.Context())
1554
		defer cancel()
1555
		var stream runtime.ServerTransportStream
1556
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1557
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1558
		var err error
1559
		var annotatedContext context.Context
1560
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1561
		if err != nil {
1562
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1563
			return
1564
		}
1565
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1566
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1567
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1568
		if err != nil {
1569
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1570
			return
1571
		}
1572
1573
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1574
1575
	})
1576
1577
	return nil
1578
}
1579
1580
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1581
// UnaryRPC     :call WatchServer directly.
1582
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1583
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1584
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1585
1586
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1587
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1588
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1589
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1590
		return
1591
	})
1592
1593
	return nil
1594
}
1595
1596
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1597
// UnaryRPC     :call SchemaServer directly.
1598
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1599
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1600
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1601
1602
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1603
		ctx, cancel := context.WithCancel(req.Context())
1604
		defer cancel()
1605
		var stream runtime.ServerTransportStream
1606
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1607
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1608
		var err error
1609
		var annotatedContext context.Context
1610
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1611
		if err != nil {
1612
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1613
			return
1614
		}
1615
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1616
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1617
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1618
		if err != nil {
1619
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1620
			return
1621
		}
1622
1623
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1624
1625
	})
1626
1627
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1628
		ctx, cancel := context.WithCancel(req.Context())
1629
		defer cancel()
1630
		var stream runtime.ServerTransportStream
1631
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1632
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1633
		var err error
1634
		var annotatedContext context.Context
1635
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
1636
		if err != nil {
1637
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1638
			return
1639
		}
1640
		resp, md, err := local_request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1641
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1642
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1643
		if err != nil {
1644
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1645
			return
1646
		}
1647
1648
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1649
1650
	})
1651
1652
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1653
		ctx, cancel := context.WithCancel(req.Context())
1654
		defer cancel()
1655
		var stream runtime.ServerTransportStream
1656
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1657
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1658
		var err error
1659
		var annotatedContext context.Context
1660
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1661
		if err != nil {
1662
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1663
			return
1664
		}
1665
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1666
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1667
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1668
		if err != nil {
1669
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1670
			return
1671
		}
1672
1673
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1674
1675
	})
1676
1677
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1678
		ctx, cancel := context.WithCancel(req.Context())
1679
		defer cancel()
1680
		var stream runtime.ServerTransportStream
1681
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1682
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1683
		var err error
1684
		var annotatedContext context.Context
1685
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
1686
		if err != nil {
1687
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1688
			return
1689
		}
1690
		resp, md, err := local_request_Schema_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1691
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1692
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1693
		if err != nil {
1694
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1695
			return
1696
		}
1697
1698
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1699
1700
	})
1701
1702
	return nil
1703
}
1704
1705
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1706
// UnaryRPC     :call DataServer directly.
1707
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1708
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1709
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1710
1711
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1712
		ctx, cancel := context.WithCancel(req.Context())
1713
		defer cancel()
1714
		var stream runtime.ServerTransportStream
1715
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1716
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1717
		var err error
1718
		var annotatedContext context.Context
1719
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1720
		if err != nil {
1721
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1722
			return
1723
		}
1724
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1725
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1726
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1727
		if err != nil {
1728
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1729
			return
1730
		}
1731
1732
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1733
1734
	})
1735
1736
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1737
		ctx, cancel := context.WithCancel(req.Context())
1738
		defer cancel()
1739
		var stream runtime.ServerTransportStream
1740
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1741
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1742
		var err error
1743
		var annotatedContext context.Context
1744
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1745
		if err != nil {
1746
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1747
			return
1748
		}
1749
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1750
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1751
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1752
		if err != nil {
1753
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1754
			return
1755
		}
1756
1757
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1758
1759
	})
1760
1761
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1762
		ctx, cancel := context.WithCancel(req.Context())
1763
		defer cancel()
1764
		var stream runtime.ServerTransportStream
1765
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1766
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1767
		var err error
1768
		var annotatedContext context.Context
1769
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1770
		if err != nil {
1771
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1772
			return
1773
		}
1774
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1775
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1776
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1777
		if err != nil {
1778
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1779
			return
1780
		}
1781
1782
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1783
1784
	})
1785
1786
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1787
		ctx, cancel := context.WithCancel(req.Context())
1788
		defer cancel()
1789
		var stream runtime.ServerTransportStream
1790
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1791
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1792
		var err error
1793
		var annotatedContext context.Context
1794
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1795
		if err != nil {
1796
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1797
			return
1798
		}
1799
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1800
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1801
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1802
		if err != nil {
1803
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1804
			return
1805
		}
1806
1807
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1808
1809
	})
1810
1811
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1812
		ctx, cancel := context.WithCancel(req.Context())
1813
		defer cancel()
1814
		var stream runtime.ServerTransportStream
1815
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1816
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1817
		var err error
1818
		var annotatedContext context.Context
1819
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1820
		if err != nil {
1821
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1822
			return
1823
		}
1824
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1825
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1826
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1827
		if err != nil {
1828
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1829
			return
1830
		}
1831
1832
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1833
1834
	})
1835
1836
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1837
		ctx, cancel := context.WithCancel(req.Context())
1838
		defer cancel()
1839
		var stream runtime.ServerTransportStream
1840
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1841
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1842
		var err error
1843
		var annotatedContext context.Context
1844
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1845
		if err != nil {
1846
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1847
			return
1848
		}
1849
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1850
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1851
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1852
		if err != nil {
1853
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1854
			return
1855
		}
1856
1857
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1858
1859
	})
1860
1861
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1862
		ctx, cancel := context.WithCancel(req.Context())
1863
		defer cancel()
1864
		var stream runtime.ServerTransportStream
1865
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1866
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1867
		var err error
1868
		var annotatedContext context.Context
1869
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1870
		if err != nil {
1871
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1872
			return
1873
		}
1874
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1875
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1876
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1877
		if err != nil {
1878
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1879
			return
1880
		}
1881
1882
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1883
1884
	})
1885
1886
	return nil
1887
}
1888
1889
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1890
// UnaryRPC     :call BundleServer directly.
1891
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1892
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1893
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1894
1895
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1896
		ctx, cancel := context.WithCancel(req.Context())
1897
		defer cancel()
1898
		var stream runtime.ServerTransportStream
1899
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1900
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1901
		var err error
1902
		var annotatedContext context.Context
1903
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1904
		if err != nil {
1905
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1906
			return
1907
		}
1908
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1909
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1910
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1911
		if err != nil {
1912
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1913
			return
1914
		}
1915
1916
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1917
1918
	})
1919
1920
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1921
		ctx, cancel := context.WithCancel(req.Context())
1922
		defer cancel()
1923
		var stream runtime.ServerTransportStream
1924
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1925
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1926
		var err error
1927
		var annotatedContext context.Context
1928
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
1929
		if err != nil {
1930
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1931
			return
1932
		}
1933
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1934
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1935
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1936
		if err != nil {
1937
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1938
			return
1939
		}
1940
1941
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1942
1943
	})
1944
1945
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1946
		ctx, cancel := context.WithCancel(req.Context())
1947
		defer cancel()
1948
		var stream runtime.ServerTransportStream
1949
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1950
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1951
		var err error
1952
		var annotatedContext context.Context
1953
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
1954
		if err != nil {
1955
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1956
			return
1957
		}
1958
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1959
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1960
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1961
		if err != nil {
1962
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1963
			return
1964
		}
1965
1966
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1967
1968
	})
1969
1970
	return nil
1971
}
1972
1973
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
1974
// UnaryRPC     :call TenancyServer directly.
1975
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1976
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
1977
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
1978
1979
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1980
		ctx, cancel := context.WithCancel(req.Context())
1981
		defer cancel()
1982
		var stream runtime.ServerTransportStream
1983
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1984
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1985
		var err error
1986
		var annotatedContext context.Context
1987
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
1988
		if err != nil {
1989
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1990
			return
1991
		}
1992
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1993
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1994
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1995
		if err != nil {
1996
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1997
			return
1998
		}
1999
2000
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2001
2002
	})
2003
2004
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2005
		ctx, cancel := context.WithCancel(req.Context())
2006
		defer cancel()
2007
		var stream runtime.ServerTransportStream
2008
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2009
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2010
		var err error
2011
		var annotatedContext context.Context
2012
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2013
		if err != nil {
2014
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2015
			return
2016
		}
2017
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2018
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2019
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2020
		if err != nil {
2021
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2022
			return
2023
		}
2024
2025
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2026
2027
	})
2028
2029
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2030
		ctx, cancel := context.WithCancel(req.Context())
2031
		defer cancel()
2032
		var stream runtime.ServerTransportStream
2033
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2034
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2035
		var err error
2036
		var annotatedContext context.Context
2037
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2038
		if err != nil {
2039
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2040
			return
2041
		}
2042
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2043
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2044
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2045
		if err != nil {
2046
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2047
			return
2048
		}
2049
2050
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2051
2052
	})
2053
2054
	return nil
2055
}
2056
2057
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
2058
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2059
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2060
	conn, err := grpc.NewClient(endpoint, opts...)
2061
	if err != nil {
2062
		return err
2063
	}
2064
	defer func() {
2065
		if err != nil {
2066
			if cerr := conn.Close(); cerr != nil {
2067
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2068
			}
2069
			return
2070
		}
2071
		go func() {
2072
			<-ctx.Done()
2073
			if cerr := conn.Close(); cerr != nil {
2074
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2075
			}
2076
		}()
2077
	}()
2078
2079
	return RegisterPermissionHandler(ctx, mux, conn)
2080
}
2081
2082
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
2083
// The handlers forward requests to the grpc endpoint over "conn".
2084
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2085
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
2086
}
2087
2088
// RegisterPermissionHandlerClient registers the http handlers for service Permission
2089
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
2090
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
2091
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2092
// "PermissionClient" to call the correct interceptors.
2093
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
2094
2095
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2096
		ctx, cancel := context.WithCancel(req.Context())
2097
		defer cancel()
2098
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2099
		var err error
2100
		var annotatedContext context.Context
2101
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2102
		if err != nil {
2103
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2104
			return
2105
		}
2106
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2107
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2108
		if err != nil {
2109
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2110
			return
2111
		}
2112
2113
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2114
2115
	})
2116
2117
	mux.Handle("POST", pattern_Permission_BulkCheck_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2118
		ctx, cancel := context.WithCancel(req.Context())
2119
		defer cancel()
2120
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2121
		var err error
2122
		var annotatedContext context.Context
2123
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/BulkCheck", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/bulk-check"))
2124
		if err != nil {
2125
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2126
			return
2127
		}
2128
		resp, md, err := request_Permission_BulkCheck_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2129
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2130
		if err != nil {
2131
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2132
			return
2133
		}
2134
2135
		forward_Permission_BulkCheck_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2136
2137
	})
2138
2139
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2140
		ctx, cancel := context.WithCancel(req.Context())
2141
		defer cancel()
2142
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2143
		var err error
2144
		var annotatedContext context.Context
2145
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2146
		if err != nil {
2147
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2148
			return
2149
		}
2150
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2151
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2152
		if err != nil {
2153
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2154
			return
2155
		}
2156
2157
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2158
2159
	})
2160
2161
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2162
		ctx, cancel := context.WithCancel(req.Context())
2163
		defer cancel()
2164
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2165
		var err error
2166
		var annotatedContext context.Context
2167
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2168
		if err != nil {
2169
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2170
			return
2171
		}
2172
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2173
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2174
		if err != nil {
2175
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2176
			return
2177
		}
2178
2179
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2180
2181
	})
2182
2183
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2184
		ctx, cancel := context.WithCancel(req.Context())
2185
		defer cancel()
2186
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2187
		var err error
2188
		var annotatedContext context.Context
2189
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2190
		if err != nil {
2191
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2192
			return
2193
		}
2194
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2195
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2196
		if err != nil {
2197
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2198
			return
2199
		}
2200
2201
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2202
2203
	})
2204
2205
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2206
		ctx, cancel := context.WithCancel(req.Context())
2207
		defer cancel()
2208
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2209
		var err error
2210
		var annotatedContext context.Context
2211
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2212
		if err != nil {
2213
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2214
			return
2215
		}
2216
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2217
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2218
		if err != nil {
2219
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2220
			return
2221
		}
2222
2223
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2224
2225
	})
2226
2227
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2228
		ctx, cancel := context.WithCancel(req.Context())
2229
		defer cancel()
2230
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2231
		var err error
2232
		var annotatedContext context.Context
2233
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2234
		if err != nil {
2235
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2236
			return
2237
		}
2238
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2239
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2240
		if err != nil {
2241
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2242
			return
2243
		}
2244
2245
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2246
2247
	})
2248
2249
	return nil
2250
}
2251
2252
var (
2253
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2254
2255
	pattern_Permission_BulkCheck_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "bulk-check"}, ""))
2256
2257
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2258
2259
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2260
2261
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2262
2263
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2264
2265
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2266
)
2267
2268
var (
2269
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2270
2271
	forward_Permission_BulkCheck_0 = runtime.ForwardResponseMessage
2272
2273
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2274
2275
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2276
2277
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2278
2279
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2280
2281
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2282
)
2283
2284
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2285
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2286
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2287
	conn, err := grpc.NewClient(endpoint, opts...)
2288
	if err != nil {
2289
		return err
2290
	}
2291
	defer func() {
2292
		if err != nil {
2293
			if cerr := conn.Close(); cerr != nil {
2294
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2295
			}
2296
			return
2297
		}
2298
		go func() {
2299
			<-ctx.Done()
2300
			if cerr := conn.Close(); cerr != nil {
2301
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2302
			}
2303
		}()
2304
	}()
2305
2306
	return RegisterWatchHandler(ctx, mux, conn)
2307
}
2308
2309
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2310
// The handlers forward requests to the grpc endpoint over "conn".
2311
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2312
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2313
}
2314
2315
// RegisterWatchHandlerClient registers the http handlers for service Watch
2316
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2317
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2318
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2319
// "WatchClient" to call the correct interceptors.
2320
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2321
2322
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2323
		ctx, cancel := context.WithCancel(req.Context())
2324
		defer cancel()
2325
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2326
		var err error
2327
		var annotatedContext context.Context
2328
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2329
		if err != nil {
2330
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2331
			return
2332
		}
2333
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2334
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2335
		if err != nil {
2336
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2337
			return
2338
		}
2339
2340
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2341
2342
	})
2343
2344
	return nil
2345
}
2346
2347
var (
2348
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2349
)
2350
2351
var (
2352
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2353
)
2354
2355
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2356
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2357
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2358
	conn, err := grpc.NewClient(endpoint, opts...)
2359
	if err != nil {
2360
		return err
2361
	}
2362
	defer func() {
2363
		if err != nil {
2364
			if cerr := conn.Close(); cerr != nil {
2365
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2366
			}
2367
			return
2368
		}
2369
		go func() {
2370
			<-ctx.Done()
2371
			if cerr := conn.Close(); cerr != nil {
2372
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2373
			}
2374
		}()
2375
	}()
2376
2377
	return RegisterSchemaHandler(ctx, mux, conn)
2378
}
2379
2380
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2381
// The handlers forward requests to the grpc endpoint over "conn".
2382
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2383
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2384
}
2385
2386
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2387
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2388
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2389
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2390
// "SchemaClient" to call the correct interceptors.
2391
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2392
2393
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2394
		ctx, cancel := context.WithCancel(req.Context())
2395
		defer cancel()
2396
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2397
		var err error
2398
		var annotatedContext context.Context
2399
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2400
		if err != nil {
2401
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2402
			return
2403
		}
2404
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2405
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2406
		if err != nil {
2407
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2408
			return
2409
		}
2410
2411
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2412
2413
	})
2414
2415
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2416
		ctx, cancel := context.WithCancel(req.Context())
2417
		defer cancel()
2418
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2419
		var err error
2420
		var annotatedContext context.Context
2421
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
2422
		if err != nil {
2423
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2424
			return
2425
		}
2426
		resp, md, err := request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2427
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2428
		if err != nil {
2429
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2430
			return
2431
		}
2432
2433
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2434
2435
	})
2436
2437
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2438
		ctx, cancel := context.WithCancel(req.Context())
2439
		defer cancel()
2440
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2441
		var err error
2442
		var annotatedContext context.Context
2443
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2444
		if err != nil {
2445
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2446
			return
2447
		}
2448
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2449
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2450
		if err != nil {
2451
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2452
			return
2453
		}
2454
2455
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2456
2457
	})
2458
2459
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2460
		ctx, cancel := context.WithCancel(req.Context())
2461
		defer cancel()
2462
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2463
		var err error
2464
		var annotatedContext context.Context
2465
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
2466
		if err != nil {
2467
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2468
			return
2469
		}
2470
		resp, md, err := request_Schema_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2471
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2472
		if err != nil {
2473
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2474
			return
2475
		}
2476
2477
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2478
2479
	})
2480
2481
	return nil
2482
}
2483
2484
var (
2485
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2486
2487
	pattern_Schema_PartialWrite_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "partial-write"}, ""))
2488
2489
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2490
2491
	pattern_Schema_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "list"}, ""))
2492
)
2493
2494
var (
2495
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2496
2497
	forward_Schema_PartialWrite_0 = runtime.ForwardResponseMessage
2498
2499
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2500
2501
	forward_Schema_List_0 = runtime.ForwardResponseMessage
2502
)
2503
2504
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2505
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2506
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2507
	conn, err := grpc.NewClient(endpoint, opts...)
2508
	if err != nil {
2509
		return err
2510
	}
2511
	defer func() {
2512
		if err != nil {
2513
			if cerr := conn.Close(); cerr != nil {
2514
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2515
			}
2516
			return
2517
		}
2518
		go func() {
2519
			<-ctx.Done()
2520
			if cerr := conn.Close(); cerr != nil {
2521
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2522
			}
2523
		}()
2524
	}()
2525
2526
	return RegisterDataHandler(ctx, mux, conn)
2527
}
2528
2529
// RegisterDataHandler registers the http handlers for service Data to "mux".
2530
// The handlers forward requests to the grpc endpoint over "conn".
2531
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2532
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2533
}
2534
2535
// RegisterDataHandlerClient registers the http handlers for service Data
2536
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2537
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2538
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2539
// "DataClient" to call the correct interceptors.
2540
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2541
2542
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2543
		ctx, cancel := context.WithCancel(req.Context())
2544
		defer cancel()
2545
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2546
		var err error
2547
		var annotatedContext context.Context
2548
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2549
		if err != nil {
2550
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2551
			return
2552
		}
2553
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2554
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2555
		if err != nil {
2556
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2557
			return
2558
		}
2559
2560
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2561
2562
	})
2563
2564
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2565
		ctx, cancel := context.WithCancel(req.Context())
2566
		defer cancel()
2567
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2568
		var err error
2569
		var annotatedContext context.Context
2570
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2571
		if err != nil {
2572
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2573
			return
2574
		}
2575
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2576
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2577
		if err != nil {
2578
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2579
			return
2580
		}
2581
2582
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2583
2584
	})
2585
2586
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2587
		ctx, cancel := context.WithCancel(req.Context())
2588
		defer cancel()
2589
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2590
		var err error
2591
		var annotatedContext context.Context
2592
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2593
		if err != nil {
2594
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2595
			return
2596
		}
2597
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2598
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2599
		if err != nil {
2600
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2601
			return
2602
		}
2603
2604
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2605
2606
	})
2607
2608
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2609
		ctx, cancel := context.WithCancel(req.Context())
2610
		defer cancel()
2611
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2612
		var err error
2613
		var annotatedContext context.Context
2614
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2615
		if err != nil {
2616
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2617
			return
2618
		}
2619
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2620
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2621
		if err != nil {
2622
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2623
			return
2624
		}
2625
2626
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2627
2628
	})
2629
2630
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2631
		ctx, cancel := context.WithCancel(req.Context())
2632
		defer cancel()
2633
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2634
		var err error
2635
		var annotatedContext context.Context
2636
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2637
		if err != nil {
2638
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2639
			return
2640
		}
2641
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2642
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2643
		if err != nil {
2644
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2645
			return
2646
		}
2647
2648
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2649
2650
	})
2651
2652
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2653
		ctx, cancel := context.WithCancel(req.Context())
2654
		defer cancel()
2655
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2656
		var err error
2657
		var annotatedContext context.Context
2658
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2659
		if err != nil {
2660
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2661
			return
2662
		}
2663
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2664
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2665
		if err != nil {
2666
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2667
			return
2668
		}
2669
2670
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2671
2672
	})
2673
2674
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2675
		ctx, cancel := context.WithCancel(req.Context())
2676
		defer cancel()
2677
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2678
		var err error
2679
		var annotatedContext context.Context
2680
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2681
		if err != nil {
2682
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2683
			return
2684
		}
2685
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2686
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2687
		if err != nil {
2688
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2689
			return
2690
		}
2691
2692
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2693
2694
	})
2695
2696
	return nil
2697
}
2698
2699
var (
2700
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2701
2702
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2703
2704
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2705
2706
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2707
2708
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2709
2710
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2711
2712
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2713
)
2714
2715
var (
2716
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2717
2718
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2719
2720
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2721
2722
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2723
2724
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2725
2726
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2727
2728
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2729
)
2730
2731
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2732
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2733
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2734
	conn, err := grpc.NewClient(endpoint, opts...)
2735
	if err != nil {
2736
		return err
2737
	}
2738
	defer func() {
2739
		if err != nil {
2740
			if cerr := conn.Close(); cerr != nil {
2741
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2742
			}
2743
			return
2744
		}
2745
		go func() {
2746
			<-ctx.Done()
2747
			if cerr := conn.Close(); cerr != nil {
2748
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2749
			}
2750
		}()
2751
	}()
2752
2753
	return RegisterBundleHandler(ctx, mux, conn)
2754
}
2755
2756
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2757
// The handlers forward requests to the grpc endpoint over "conn".
2758
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2759
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2760
}
2761
2762
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2763
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2764
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2765
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2766
// "BundleClient" to call the correct interceptors.
2767
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2768
2769
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2770
		ctx, cancel := context.WithCancel(req.Context())
2771
		defer cancel()
2772
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2773
		var err error
2774
		var annotatedContext context.Context
2775
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2776
		if err != nil {
2777
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2778
			return
2779
		}
2780
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2781
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2782
		if err != nil {
2783
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2784
			return
2785
		}
2786
2787
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2788
2789
	})
2790
2791
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2792
		ctx, cancel := context.WithCancel(req.Context())
2793
		defer cancel()
2794
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2795
		var err error
2796
		var annotatedContext context.Context
2797
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2798
		if err != nil {
2799
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2800
			return
2801
		}
2802
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2803
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2804
		if err != nil {
2805
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2806
			return
2807
		}
2808
2809
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2810
2811
	})
2812
2813
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2814
		ctx, cancel := context.WithCancel(req.Context())
2815
		defer cancel()
2816
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2817
		var err error
2818
		var annotatedContext context.Context
2819
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2820
		if err != nil {
2821
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2822
			return
2823
		}
2824
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2825
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2826
		if err != nil {
2827
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2828
			return
2829
		}
2830
2831
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2832
2833
	})
2834
2835
	return nil
2836
}
2837
2838
var (
2839
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2840
2841
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2842
2843
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2844
)
2845
2846
var (
2847
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2848
2849
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2850
2851
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2852
)
2853
2854
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2855
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2856
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2857
	conn, err := grpc.NewClient(endpoint, opts...)
2858
	if err != nil {
2859
		return err
2860
	}
2861
	defer func() {
2862
		if err != nil {
2863
			if cerr := conn.Close(); cerr != nil {
2864
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2865
			}
2866
			return
2867
		}
2868
		go func() {
2869
			<-ctx.Done()
2870
			if cerr := conn.Close(); cerr != nil {
2871
				grpclog.Errorf("Failed to close conn to %s: %v", endpoint, cerr)
2872
			}
2873
		}()
2874
	}()
2875
2876
	return RegisterTenancyHandler(ctx, mux, conn)
2877
}
2878
2879
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2880
// The handlers forward requests to the grpc endpoint over "conn".
2881
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2882
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2883
}
2884
2885
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2886
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2887
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2888
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2889
// "TenancyClient" to call the correct interceptors.
2890
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2891
2892
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2893
		ctx, cancel := context.WithCancel(req.Context())
2894
		defer cancel()
2895
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2896
		var err error
2897
		var annotatedContext context.Context
2898
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2899
		if err != nil {
2900
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2901
			return
2902
		}
2903
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2904
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2905
		if err != nil {
2906
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2907
			return
2908
		}
2909
2910
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2911
2912
	})
2913
2914
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2915
		ctx, cancel := context.WithCancel(req.Context())
2916
		defer cancel()
2917
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2918
		var err error
2919
		var annotatedContext context.Context
2920
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2921
		if err != nil {
2922
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2923
			return
2924
		}
2925
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2926
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2927
		if err != nil {
2928
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2929
			return
2930
		}
2931
2932
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2933
2934
	})
2935
2936
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2937
		ctx, cancel := context.WithCancel(req.Context())
2938
		defer cancel()
2939
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2940
		var err error
2941
		var annotatedContext context.Context
2942
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2943
		if err != nil {
2944
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2945
			return
2946
		}
2947
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2948
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2949
		if err != nil {
2950
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2951
			return
2952
		}
2953
2954
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2955
2956
	})
2957
2958
	return nil
2959
}
2960
2961
var (
2962
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
2963
2964
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
2965
2966
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
2967
)
2968
2969
var (
2970
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
2971
2972
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
2973
2974
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
2975
)
2976