Passed
Push — master ( 496048...563bb3 )
by Tolga
01:01 queued 13s
created

basev1.request_Permission_LookupEntity_0   B

Complexity

Conditions 6

Size

Total Lines 31
Code Lines 21

Duplication

Lines 0
Ratio 0 %

Importance

Changes 0
Metric Value
cc 6
eloc 21
nop 5
dl 0
loc 31
rs 8.4426
c 0
b 0
f 0
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: base/v1/service.proto
3
4
/*
5
Package basev1 is a reverse proxy.
6
7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package basev1
10
11
import (
12
	"context"
13
	"io"
14
	"net/http"
15
16
	"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
	"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
	"google.golang.org/grpc"
19
	"google.golang.org/grpc/codes"
20
	"google.golang.org/grpc/grpclog"
21
	"google.golang.org/grpc/metadata"
22
	"google.golang.org/grpc/status"
23
	"google.golang.org/protobuf/proto"
24
)
25
26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33
34
func request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
35
	var protoReq PermissionCheckRequest
36
	var metadata runtime.ServerMetadata
37
38
	newReader, berr := utilities.IOReaderFactory(req.Body)
39
	if berr != nil {
40
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
41
	}
42
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
43
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
44
	}
45
46
	var (
47
		val string
48
		ok  bool
49
		err error
50
		_   = err
51
	)
52
53
	val, ok = pathParams["tenant_id"]
54
	if !ok {
55
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
56
	}
57
58
	protoReq.TenantId, err = runtime.String(val)
59
	if err != nil {
60
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
61
	}
62
63
	msg, err := client.Check(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
64
	return msg, metadata, err
65
66
}
67
68
func local_request_Permission_Check_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
69
	var protoReq PermissionCheckRequest
70
	var metadata runtime.ServerMetadata
71
72
	newReader, berr := utilities.IOReaderFactory(req.Body)
73
	if berr != nil {
74
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
75
	}
76
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
77
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
78
	}
79
80
	var (
81
		val string
82
		ok  bool
83
		err error
84
		_   = err
85
	)
86
87
	val, ok = pathParams["tenant_id"]
88
	if !ok {
89
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
90
	}
91
92
	protoReq.TenantId, err = runtime.String(val)
93
	if err != nil {
94
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
95
	}
96
97
	msg, err := server.Check(ctx, &protoReq)
98
	return msg, metadata, err
99
100
}
101
102
func request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
103
	var protoReq PermissionExpandRequest
104
	var metadata runtime.ServerMetadata
105
106
	newReader, berr := utilities.IOReaderFactory(req.Body)
107
	if berr != nil {
108
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
109
	}
110
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
111
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
112
	}
113
114
	var (
115
		val string
116
		ok  bool
117
		err error
118
		_   = err
119
	)
120
121
	val, ok = pathParams["tenant_id"]
122
	if !ok {
123
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
124
	}
125
126
	protoReq.TenantId, err = runtime.String(val)
127
	if err != nil {
128
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
129
	}
130
131
	msg, err := client.Expand(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
132
	return msg, metadata, err
133
134
}
135
136
func local_request_Permission_Expand_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
137
	var protoReq PermissionExpandRequest
138
	var metadata runtime.ServerMetadata
139
140
	newReader, berr := utilities.IOReaderFactory(req.Body)
141
	if berr != nil {
142
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
143
	}
144
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
145
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
146
	}
147
148
	var (
149
		val string
150
		ok  bool
151
		err error
152
		_   = err
153
	)
154
155
	val, ok = pathParams["tenant_id"]
156
	if !ok {
157
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
158
	}
159
160
	protoReq.TenantId, err = runtime.String(val)
161
	if err != nil {
162
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
163
	}
164
165
	msg, err := server.Expand(ctx, &protoReq)
166
	return msg, metadata, err
167
168
}
169
170
func request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
171
	var protoReq PermissionLookupEntityRequest
172
	var metadata runtime.ServerMetadata
173
174
	newReader, berr := utilities.IOReaderFactory(req.Body)
175
	if berr != nil {
176
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
177
	}
178
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
179
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
180
	}
181
182
	var (
183
		val string
184
		ok  bool
185
		err error
186
		_   = err
187
	)
188
189
	val, ok = pathParams["tenant_id"]
190
	if !ok {
191
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
192
	}
193
194
	protoReq.TenantId, err = runtime.String(val)
195
	if err != nil {
196
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
197
	}
198
199
	msg, err := client.LookupEntity(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
200
	return msg, metadata, err
201
202
}
203
204
func local_request_Permission_LookupEntity_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
205
	var protoReq PermissionLookupEntityRequest
206
	var metadata runtime.ServerMetadata
207
208
	newReader, berr := utilities.IOReaderFactory(req.Body)
209
	if berr != nil {
210
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
211
	}
212
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
213
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
214
	}
215
216
	var (
217
		val string
218
		ok  bool
219
		err error
220
		_   = err
221
	)
222
223
	val, ok = pathParams["tenant_id"]
224
	if !ok {
225
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
226
	}
227
228
	protoReq.TenantId, err = runtime.String(val)
229
	if err != nil {
230
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
231
	}
232
233
	msg, err := server.LookupEntity(ctx, &protoReq)
234
	return msg, metadata, err
235
236
}
237
238
func request_Permission_LookupEntityStream_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (Permission_LookupEntityStreamClient, runtime.ServerMetadata, error) {
239
	var protoReq PermissionLookupEntityRequest
240
	var metadata runtime.ServerMetadata
241
242
	newReader, berr := utilities.IOReaderFactory(req.Body)
243
	if berr != nil {
244
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
245
	}
246
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
247
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
248
	}
249
250
	var (
251
		val string
252
		ok  bool
253
		err error
254
		_   = err
255
	)
256
257
	val, ok = pathParams["tenant_id"]
258
	if !ok {
259
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
260
	}
261
262
	protoReq.TenantId, err = runtime.String(val)
263
	if err != nil {
264
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
265
	}
266
267
	stream, err := client.LookupEntityStream(ctx, &protoReq)
268
	if err != nil {
269
		return nil, metadata, err
270
	}
271
	header, err := stream.Header()
272
	if err != nil {
273
		return nil, metadata, err
274
	}
275
	metadata.HeaderMD = header
276
	return stream, metadata, nil
277
278
}
279
280
func request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
281
	var protoReq PermissionLookupSubjectRequest
282
	var metadata runtime.ServerMetadata
283
284
	newReader, berr := utilities.IOReaderFactory(req.Body)
285
	if berr != nil {
286
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
287
	}
288
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
289
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
290
	}
291
292
	var (
293
		val string
294
		ok  bool
295
		err error
296
		_   = err
297
	)
298
299
	val, ok = pathParams["tenant_id"]
300
	if !ok {
301
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
302
	}
303
304
	protoReq.TenantId, err = runtime.String(val)
305
	if err != nil {
306
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
307
	}
308
309
	msg, err := client.LookupSubject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
310
	return msg, metadata, err
311
312
}
313
314
func local_request_Permission_LookupSubject_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
315
	var protoReq PermissionLookupSubjectRequest
316
	var metadata runtime.ServerMetadata
317
318
	newReader, berr := utilities.IOReaderFactory(req.Body)
319
	if berr != nil {
320
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
321
	}
322
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
323
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
324
	}
325
326
	var (
327
		val string
328
		ok  bool
329
		err error
330
		_   = err
331
	)
332
333
	val, ok = pathParams["tenant_id"]
334
	if !ok {
335
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
336
	}
337
338
	protoReq.TenantId, err = runtime.String(val)
339
	if err != nil {
340
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
341
	}
342
343
	msg, err := server.LookupSubject(ctx, &protoReq)
344
	return msg, metadata, err
345
346
}
347
348
func request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, client PermissionClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
349
	var protoReq PermissionSubjectPermissionRequest
350
	var metadata runtime.ServerMetadata
351
352
	newReader, berr := utilities.IOReaderFactory(req.Body)
353
	if berr != nil {
354
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
355
	}
356
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
357
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
358
	}
359
360
	var (
361
		val string
362
		ok  bool
363
		err error
364
		_   = err
365
	)
366
367
	val, ok = pathParams["tenant_id"]
368
	if !ok {
369
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
370
	}
371
372
	protoReq.TenantId, err = runtime.String(val)
373
	if err != nil {
374
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
375
	}
376
377
	msg, err := client.SubjectPermission(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
378
	return msg, metadata, err
379
380
}
381
382
func local_request_Permission_SubjectPermission_0(ctx context.Context, marshaler runtime.Marshaler, server PermissionServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
383
	var protoReq PermissionSubjectPermissionRequest
384
	var metadata runtime.ServerMetadata
385
386
	newReader, berr := utilities.IOReaderFactory(req.Body)
387
	if berr != nil {
388
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
389
	}
390
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
391
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
392
	}
393
394
	var (
395
		val string
396
		ok  bool
397
		err error
398
		_   = err
399
	)
400
401
	val, ok = pathParams["tenant_id"]
402
	if !ok {
403
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
404
	}
405
406
	protoReq.TenantId, err = runtime.String(val)
407
	if err != nil {
408
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
409
	}
410
411
	msg, err := server.SubjectPermission(ctx, &protoReq)
412
	return msg, metadata, err
413
414
}
415
416
func request_Watch_Watch_0(ctx context.Context, marshaler runtime.Marshaler, client WatchClient, req *http.Request, pathParams map[string]string) (Watch_WatchClient, runtime.ServerMetadata, error) {
417
	var protoReq WatchRequest
418
	var metadata runtime.ServerMetadata
419
420
	newReader, berr := utilities.IOReaderFactory(req.Body)
421
	if berr != nil {
422
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
423
	}
424
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
425
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
426
	}
427
428
	var (
429
		val string
430
		ok  bool
431
		err error
432
		_   = err
433
	)
434
435
	val, ok = pathParams["tenant_id"]
436
	if !ok {
437
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
438
	}
439
440
	protoReq.TenantId, err = runtime.String(val)
441
	if err != nil {
442
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
443
	}
444
445
	stream, err := client.Watch(ctx, &protoReq)
446
	if err != nil {
447
		return nil, metadata, err
448
	}
449
	header, err := stream.Header()
450
	if err != nil {
451
		return nil, metadata, err
452
	}
453
	metadata.HeaderMD = header
454
	return stream, metadata, nil
455
456
}
457
458
func request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
459
	var protoReq SchemaWriteRequest
460
	var metadata runtime.ServerMetadata
461
462
	newReader, berr := utilities.IOReaderFactory(req.Body)
463
	if berr != nil {
464
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
465
	}
466
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
467
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
468
	}
469
470
	var (
471
		val string
472
		ok  bool
473
		err error
474
		_   = err
475
	)
476
477
	val, ok = pathParams["tenant_id"]
478
	if !ok {
479
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
480
	}
481
482
	protoReq.TenantId, err = runtime.String(val)
483
	if err != nil {
484
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
485
	}
486
487
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
488
	return msg, metadata, err
489
490
}
491
492
func local_request_Schema_Write_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
493
	var protoReq SchemaWriteRequest
494
	var metadata runtime.ServerMetadata
495
496
	newReader, berr := utilities.IOReaderFactory(req.Body)
497
	if berr != nil {
498
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
499
	}
500
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
501
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
502
	}
503
504
	var (
505
		val string
506
		ok  bool
507
		err error
508
		_   = err
509
	)
510
511
	val, ok = pathParams["tenant_id"]
512
	if !ok {
513
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
514
	}
515
516
	protoReq.TenantId, err = runtime.String(val)
517
	if err != nil {
518
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
519
	}
520
521
	msg, err := server.Write(ctx, &protoReq)
522
	return msg, metadata, err
523
524
}
525
526
func request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
527
	var protoReq SchemaPartialWriteRequest
528
	var metadata runtime.ServerMetadata
529
530
	newReader, berr := utilities.IOReaderFactory(req.Body)
531
	if berr != nil {
532
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
533
	}
534
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
535
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
536
	}
537
538
	var (
539
		val string
540
		ok  bool
541
		err error
542
		_   = err
543
	)
544
545
	val, ok = pathParams["tenant_id"]
546
	if !ok {
547
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
548
	}
549
550
	protoReq.TenantId, err = runtime.String(val)
551
	if err != nil {
552
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
553
	}
554
555
	msg, err := client.PartialWrite(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
556
	return msg, metadata, err
557
558
}
559
560
func local_request_Schema_PartialWrite_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
561
	var protoReq SchemaPartialWriteRequest
562
	var metadata runtime.ServerMetadata
563
564
	newReader, berr := utilities.IOReaderFactory(req.Body)
565
	if berr != nil {
566
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
567
	}
568
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
569
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
570
	}
571
572
	var (
573
		val string
574
		ok  bool
575
		err error
576
		_   = err
577
	)
578
579
	val, ok = pathParams["tenant_id"]
580
	if !ok {
581
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
582
	}
583
584
	protoReq.TenantId, err = runtime.String(val)
585
	if err != nil {
586
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
587
	}
588
589
	msg, err := server.PartialWrite(ctx, &protoReq)
590
	return msg, metadata, err
591
592
}
593
594
func request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
595
	var protoReq SchemaReadRequest
596
	var metadata runtime.ServerMetadata
597
598
	newReader, berr := utilities.IOReaderFactory(req.Body)
599
	if berr != nil {
600
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
601
	}
602
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
603
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
604
	}
605
606
	var (
607
		val string
608
		ok  bool
609
		err error
610
		_   = err
611
	)
612
613
	val, ok = pathParams["tenant_id"]
614
	if !ok {
615
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
616
	}
617
618
	protoReq.TenantId, err = runtime.String(val)
619
	if err != nil {
620
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
621
	}
622
623
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
624
	return msg, metadata, err
625
626
}
627
628
func local_request_Schema_Read_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
629
	var protoReq SchemaReadRequest
630
	var metadata runtime.ServerMetadata
631
632
	newReader, berr := utilities.IOReaderFactory(req.Body)
633
	if berr != nil {
634
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
635
	}
636
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
637
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
638
	}
639
640
	var (
641
		val string
642
		ok  bool
643
		err error
644
		_   = err
645
	)
646
647
	val, ok = pathParams["tenant_id"]
648
	if !ok {
649
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
650
	}
651
652
	protoReq.TenantId, err = runtime.String(val)
653
	if err != nil {
654
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
655
	}
656
657
	msg, err := server.Read(ctx, &protoReq)
658
	return msg, metadata, err
659
660
}
661
662
func request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, client SchemaClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
663
	var protoReq SchemaListRequest
664
	var metadata runtime.ServerMetadata
665
666
	newReader, berr := utilities.IOReaderFactory(req.Body)
667
	if berr != nil {
668
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
669
	}
670
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
671
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
672
	}
673
674
	var (
675
		val string
676
		ok  bool
677
		err error
678
		_   = err
679
	)
680
681
	val, ok = pathParams["tenant_id"]
682
	if !ok {
683
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
684
	}
685
686
	protoReq.TenantId, err = runtime.String(val)
687
	if err != nil {
688
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
689
	}
690
691
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
692
	return msg, metadata, err
693
694
}
695
696
func local_request_Schema_List_0(ctx context.Context, marshaler runtime.Marshaler, server SchemaServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
697
	var protoReq SchemaListRequest
698
	var metadata runtime.ServerMetadata
699
700
	newReader, berr := utilities.IOReaderFactory(req.Body)
701
	if berr != nil {
702
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
703
	}
704
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
705
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
706
	}
707
708
	var (
709
		val string
710
		ok  bool
711
		err error
712
		_   = err
713
	)
714
715
	val, ok = pathParams["tenant_id"]
716
	if !ok {
717
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
718
	}
719
720
	protoReq.TenantId, err = runtime.String(val)
721
	if err != nil {
722
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
723
	}
724
725
	msg, err := server.List(ctx, &protoReq)
726
	return msg, metadata, err
727
728
}
729
730
func request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
731
	var protoReq DataWriteRequest
732
	var metadata runtime.ServerMetadata
733
734
	newReader, berr := utilities.IOReaderFactory(req.Body)
735
	if berr != nil {
736
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
737
	}
738
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
739
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
740
	}
741
742
	var (
743
		val string
744
		ok  bool
745
		err error
746
		_   = err
747
	)
748
749
	val, ok = pathParams["tenant_id"]
750
	if !ok {
751
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
752
	}
753
754
	protoReq.TenantId, err = runtime.String(val)
755
	if err != nil {
756
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
757
	}
758
759
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
760
	return msg, metadata, err
761
762
}
763
764
func local_request_Data_Write_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
765
	var protoReq DataWriteRequest
766
	var metadata runtime.ServerMetadata
767
768
	newReader, berr := utilities.IOReaderFactory(req.Body)
769
	if berr != nil {
770
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
771
	}
772
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
773
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
774
	}
775
776
	var (
777
		val string
778
		ok  bool
779
		err error
780
		_   = err
781
	)
782
783
	val, ok = pathParams["tenant_id"]
784
	if !ok {
785
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
786
	}
787
788
	protoReq.TenantId, err = runtime.String(val)
789
	if err != nil {
790
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
791
	}
792
793
	msg, err := server.Write(ctx, &protoReq)
794
	return msg, metadata, err
795
796
}
797
798
func request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
799
	var protoReq RelationshipWriteRequest
800
	var metadata runtime.ServerMetadata
801
802
	newReader, berr := utilities.IOReaderFactory(req.Body)
803
	if berr != nil {
804
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
805
	}
806
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
807
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
808
	}
809
810
	var (
811
		val string
812
		ok  bool
813
		err error
814
		_   = err
815
	)
816
817
	val, ok = pathParams["tenant_id"]
818
	if !ok {
819
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
820
	}
821
822
	protoReq.TenantId, err = runtime.String(val)
823
	if err != nil {
824
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
825
	}
826
827
	msg, err := client.WriteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
828
	return msg, metadata, err
829
830
}
831
832
func local_request_Data_WriteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
833
	var protoReq RelationshipWriteRequest
834
	var metadata runtime.ServerMetadata
835
836
	newReader, berr := utilities.IOReaderFactory(req.Body)
837
	if berr != nil {
838
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
839
	}
840
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
841
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
842
	}
843
844
	var (
845
		val string
846
		ok  bool
847
		err error
848
		_   = err
849
	)
850
851
	val, ok = pathParams["tenant_id"]
852
	if !ok {
853
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
854
	}
855
856
	protoReq.TenantId, err = runtime.String(val)
857
	if err != nil {
858
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
859
	}
860
861
	msg, err := server.WriteRelationships(ctx, &protoReq)
862
	return msg, metadata, err
863
864
}
865
866
func request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
867
	var protoReq RelationshipReadRequest
868
	var metadata runtime.ServerMetadata
869
870
	newReader, berr := utilities.IOReaderFactory(req.Body)
871
	if berr != nil {
872
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
873
	}
874
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
875
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
876
	}
877
878
	var (
879
		val string
880
		ok  bool
881
		err error
882
		_   = err
883
	)
884
885
	val, ok = pathParams["tenant_id"]
886
	if !ok {
887
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
888
	}
889
890
	protoReq.TenantId, err = runtime.String(val)
891
	if err != nil {
892
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
893
	}
894
895
	msg, err := client.ReadRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
896
	return msg, metadata, err
897
898
}
899
900
func local_request_Data_ReadRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
901
	var protoReq RelationshipReadRequest
902
	var metadata runtime.ServerMetadata
903
904
	newReader, berr := utilities.IOReaderFactory(req.Body)
905
	if berr != nil {
906
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
907
	}
908
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
909
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
910
	}
911
912
	var (
913
		val string
914
		ok  bool
915
		err error
916
		_   = err
917
	)
918
919
	val, ok = pathParams["tenant_id"]
920
	if !ok {
921
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
922
	}
923
924
	protoReq.TenantId, err = runtime.String(val)
925
	if err != nil {
926
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
927
	}
928
929
	msg, err := server.ReadRelationships(ctx, &protoReq)
930
	return msg, metadata, err
931
932
}
933
934
func request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
935
	var protoReq AttributeReadRequest
936
	var metadata runtime.ServerMetadata
937
938
	newReader, berr := utilities.IOReaderFactory(req.Body)
939
	if berr != nil {
940
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
941
	}
942
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
943
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
944
	}
945
946
	var (
947
		val string
948
		ok  bool
949
		err error
950
		_   = err
951
	)
952
953
	val, ok = pathParams["tenant_id"]
954
	if !ok {
955
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
956
	}
957
958
	protoReq.TenantId, err = runtime.String(val)
959
	if err != nil {
960
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
961
	}
962
963
	msg, err := client.ReadAttributes(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
964
	return msg, metadata, err
965
966
}
967
968
func local_request_Data_ReadAttributes_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
969
	var protoReq AttributeReadRequest
970
	var metadata runtime.ServerMetadata
971
972
	newReader, berr := utilities.IOReaderFactory(req.Body)
973
	if berr != nil {
974
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
975
	}
976
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
977
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
978
	}
979
980
	var (
981
		val string
982
		ok  bool
983
		err error
984
		_   = err
985
	)
986
987
	val, ok = pathParams["tenant_id"]
988
	if !ok {
989
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
990
	}
991
992
	protoReq.TenantId, err = runtime.String(val)
993
	if err != nil {
994
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
995
	}
996
997
	msg, err := server.ReadAttributes(ctx, &protoReq)
998
	return msg, metadata, err
999
1000
}
1001
1002
func request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1003
	var protoReq DataDeleteRequest
1004
	var metadata runtime.ServerMetadata
1005
1006
	newReader, berr := utilities.IOReaderFactory(req.Body)
1007
	if berr != nil {
1008
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1009
	}
1010
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1011
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1012
	}
1013
1014
	var (
1015
		val string
1016
		ok  bool
1017
		err error
1018
		_   = err
1019
	)
1020
1021
	val, ok = pathParams["tenant_id"]
1022
	if !ok {
1023
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1024
	}
1025
1026
	protoReq.TenantId, err = runtime.String(val)
1027
	if err != nil {
1028
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1029
	}
1030
1031
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1032
	return msg, metadata, err
1033
1034
}
1035
1036
func local_request_Data_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1037
	var protoReq DataDeleteRequest
1038
	var metadata runtime.ServerMetadata
1039
1040
	newReader, berr := utilities.IOReaderFactory(req.Body)
1041
	if berr != nil {
1042
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1043
	}
1044
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1045
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1046
	}
1047
1048
	var (
1049
		val string
1050
		ok  bool
1051
		err error
1052
		_   = err
1053
	)
1054
1055
	val, ok = pathParams["tenant_id"]
1056
	if !ok {
1057
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1058
	}
1059
1060
	protoReq.TenantId, err = runtime.String(val)
1061
	if err != nil {
1062
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1063
	}
1064
1065
	msg, err := server.Delete(ctx, &protoReq)
1066
	return msg, metadata, err
1067
1068
}
1069
1070
func request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1071
	var protoReq RelationshipDeleteRequest
1072
	var metadata runtime.ServerMetadata
1073
1074
	newReader, berr := utilities.IOReaderFactory(req.Body)
1075
	if berr != nil {
1076
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1077
	}
1078
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1079
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1080
	}
1081
1082
	var (
1083
		val string
1084
		ok  bool
1085
		err error
1086
		_   = err
1087
	)
1088
1089
	val, ok = pathParams["tenant_id"]
1090
	if !ok {
1091
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1092
	}
1093
1094
	protoReq.TenantId, err = runtime.String(val)
1095
	if err != nil {
1096
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1097
	}
1098
1099
	msg, err := client.DeleteRelationships(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1100
	return msg, metadata, err
1101
1102
}
1103
1104
func local_request_Data_DeleteRelationships_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1105
	var protoReq RelationshipDeleteRequest
1106
	var metadata runtime.ServerMetadata
1107
1108
	newReader, berr := utilities.IOReaderFactory(req.Body)
1109
	if berr != nil {
1110
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1111
	}
1112
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1113
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1114
	}
1115
1116
	var (
1117
		val string
1118
		ok  bool
1119
		err error
1120
		_   = err
1121
	)
1122
1123
	val, ok = pathParams["tenant_id"]
1124
	if !ok {
1125
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1126
	}
1127
1128
	protoReq.TenantId, err = runtime.String(val)
1129
	if err != nil {
1130
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1131
	}
1132
1133
	msg, err := server.DeleteRelationships(ctx, &protoReq)
1134
	return msg, metadata, err
1135
1136
}
1137
1138
func request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, client DataClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1139
	var protoReq BundleRunRequest
1140
	var metadata runtime.ServerMetadata
1141
1142
	newReader, berr := utilities.IOReaderFactory(req.Body)
1143
	if berr != nil {
1144
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1145
	}
1146
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1147
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1148
	}
1149
1150
	var (
1151
		val string
1152
		ok  bool
1153
		err error
1154
		_   = err
1155
	)
1156
1157
	val, ok = pathParams["tenant_id"]
1158
	if !ok {
1159
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1160
	}
1161
1162
	protoReq.TenantId, err = runtime.String(val)
1163
	if err != nil {
1164
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1165
	}
1166
1167
	msg, err := client.RunBundle(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1168
	return msg, metadata, err
1169
1170
}
1171
1172
func local_request_Data_RunBundle_0(ctx context.Context, marshaler runtime.Marshaler, server DataServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1173
	var protoReq BundleRunRequest
1174
	var metadata runtime.ServerMetadata
1175
1176
	newReader, berr := utilities.IOReaderFactory(req.Body)
1177
	if berr != nil {
1178
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1179
	}
1180
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1181
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1182
	}
1183
1184
	var (
1185
		val string
1186
		ok  bool
1187
		err error
1188
		_   = err
1189
	)
1190
1191
	val, ok = pathParams["tenant_id"]
1192
	if !ok {
1193
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1194
	}
1195
1196
	protoReq.TenantId, err = runtime.String(val)
1197
	if err != nil {
1198
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1199
	}
1200
1201
	msg, err := server.RunBundle(ctx, &protoReq)
1202
	return msg, metadata, err
1203
1204
}
1205
1206
func request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1207
	var protoReq BundleWriteRequest
1208
	var metadata runtime.ServerMetadata
1209
1210
	newReader, berr := utilities.IOReaderFactory(req.Body)
1211
	if berr != nil {
1212
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1213
	}
1214
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1215
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1216
	}
1217
1218
	var (
1219
		val string
1220
		ok  bool
1221
		err error
1222
		_   = err
1223
	)
1224
1225
	val, ok = pathParams["tenant_id"]
1226
	if !ok {
1227
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1228
	}
1229
1230
	protoReq.TenantId, err = runtime.String(val)
1231
	if err != nil {
1232
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1233
	}
1234
1235
	msg, err := client.Write(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1236
	return msg, metadata, err
1237
1238
}
1239
1240
func local_request_Bundle_Write_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1241
	var protoReq BundleWriteRequest
1242
	var metadata runtime.ServerMetadata
1243
1244
	newReader, berr := utilities.IOReaderFactory(req.Body)
1245
	if berr != nil {
1246
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1247
	}
1248
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1249
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1250
	}
1251
1252
	var (
1253
		val string
1254
		ok  bool
1255
		err error
1256
		_   = err
1257
	)
1258
1259
	val, ok = pathParams["tenant_id"]
1260
	if !ok {
1261
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1262
	}
1263
1264
	protoReq.TenantId, err = runtime.String(val)
1265
	if err != nil {
1266
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1267
	}
1268
1269
	msg, err := server.Write(ctx, &protoReq)
1270
	return msg, metadata, err
1271
1272
}
1273
1274
func request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1275
	var protoReq BundleReadRequest
1276
	var metadata runtime.ServerMetadata
1277
1278
	newReader, berr := utilities.IOReaderFactory(req.Body)
1279
	if berr != nil {
1280
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1281
	}
1282
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1283
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1284
	}
1285
1286
	var (
1287
		val string
1288
		ok  bool
1289
		err error
1290
		_   = err
1291
	)
1292
1293
	val, ok = pathParams["tenant_id"]
1294
	if !ok {
1295
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1296
	}
1297
1298
	protoReq.TenantId, err = runtime.String(val)
1299
	if err != nil {
1300
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1301
	}
1302
1303
	msg, err := client.Read(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1304
	return msg, metadata, err
1305
1306
}
1307
1308
func local_request_Bundle_Read_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1309
	var protoReq BundleReadRequest
1310
	var metadata runtime.ServerMetadata
1311
1312
	newReader, berr := utilities.IOReaderFactory(req.Body)
1313
	if berr != nil {
1314
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1315
	}
1316
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1317
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1318
	}
1319
1320
	var (
1321
		val string
1322
		ok  bool
1323
		err error
1324
		_   = err
1325
	)
1326
1327
	val, ok = pathParams["tenant_id"]
1328
	if !ok {
1329
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1330
	}
1331
1332
	protoReq.TenantId, err = runtime.String(val)
1333
	if err != nil {
1334
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1335
	}
1336
1337
	msg, err := server.Read(ctx, &protoReq)
1338
	return msg, metadata, err
1339
1340
}
1341
1342
func request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client BundleClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1343
	var protoReq BundleDeleteRequest
1344
	var metadata runtime.ServerMetadata
1345
1346
	newReader, berr := utilities.IOReaderFactory(req.Body)
1347
	if berr != nil {
1348
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1349
	}
1350
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1351
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1352
	}
1353
1354
	var (
1355
		val string
1356
		ok  bool
1357
		err error
1358
		_   = err
1359
	)
1360
1361
	val, ok = pathParams["tenant_id"]
1362
	if !ok {
1363
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1364
	}
1365
1366
	protoReq.TenantId, err = runtime.String(val)
1367
	if err != nil {
1368
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1369
	}
1370
1371
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1372
	return msg, metadata, err
1373
1374
}
1375
1376
func local_request_Bundle_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server BundleServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1377
	var protoReq BundleDeleteRequest
1378
	var metadata runtime.ServerMetadata
1379
1380
	newReader, berr := utilities.IOReaderFactory(req.Body)
1381
	if berr != nil {
1382
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1383
	}
1384
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1385
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1386
	}
1387
1388
	var (
1389
		val string
1390
		ok  bool
1391
		err error
1392
		_   = err
1393
	)
1394
1395
	val, ok = pathParams["tenant_id"]
1396
	if !ok {
1397
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "tenant_id")
1398
	}
1399
1400
	protoReq.TenantId, err = runtime.String(val)
1401
	if err != nil {
1402
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "tenant_id", err)
1403
	}
1404
1405
	msg, err := server.Delete(ctx, &protoReq)
1406
	return msg, metadata, err
1407
1408
}
1409
1410
func request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1411
	var protoReq TenantCreateRequest
1412
	var metadata runtime.ServerMetadata
1413
1414
	newReader, berr := utilities.IOReaderFactory(req.Body)
1415
	if berr != nil {
1416
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1417
	}
1418
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1419
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1420
	}
1421
1422
	msg, err := client.Create(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1423
	return msg, metadata, err
1424
1425
}
1426
1427
func local_request_Tenancy_Create_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1428
	var protoReq TenantCreateRequest
1429
	var metadata runtime.ServerMetadata
1430
1431
	newReader, berr := utilities.IOReaderFactory(req.Body)
1432
	if berr != nil {
1433
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1434
	}
1435
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1436
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1437
	}
1438
1439
	msg, err := server.Create(ctx, &protoReq)
1440
	return msg, metadata, err
1441
1442
}
1443
1444
func request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1445
	var protoReq TenantDeleteRequest
1446
	var metadata runtime.ServerMetadata
1447
1448
	var (
1449
		val string
1450
		ok  bool
1451
		err error
1452
		_   = err
1453
	)
1454
1455
	val, ok = pathParams["id"]
1456
	if !ok {
1457
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1458
	}
1459
1460
	protoReq.Id, err = runtime.String(val)
1461
	if err != nil {
1462
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1463
	}
1464
1465
	msg, err := client.Delete(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1466
	return msg, metadata, err
1467
1468
}
1469
1470
func local_request_Tenancy_Delete_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1471
	var protoReq TenantDeleteRequest
1472
	var metadata runtime.ServerMetadata
1473
1474
	var (
1475
		val string
1476
		ok  bool
1477
		err error
1478
		_   = err
1479
	)
1480
1481
	val, ok = pathParams["id"]
1482
	if !ok {
1483
		return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id")
1484
	}
1485
1486
	protoReq.Id, err = runtime.String(val)
1487
	if err != nil {
1488
		return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err)
1489
	}
1490
1491
	msg, err := server.Delete(ctx, &protoReq)
1492
	return msg, metadata, err
1493
1494
}
1495
1496
func request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, client TenancyClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1497
	var protoReq TenantListRequest
1498
	var metadata runtime.ServerMetadata
1499
1500
	newReader, berr := utilities.IOReaderFactory(req.Body)
1501
	if berr != nil {
1502
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1503
	}
1504
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1505
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1506
	}
1507
1508
	msg, err := client.List(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
1509
	return msg, metadata, err
1510
1511
}
1512
1513
func local_request_Tenancy_List_0(ctx context.Context, marshaler runtime.Marshaler, server TenancyServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
1514
	var protoReq TenantListRequest
1515
	var metadata runtime.ServerMetadata
1516
1517
	newReader, berr := utilities.IOReaderFactory(req.Body)
1518
	if berr != nil {
1519
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
1520
	}
1521
	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
1522
		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
1523
	}
1524
1525
	msg, err := server.List(ctx, &protoReq)
1526
	return msg, metadata, err
1527
1528
}
1529
1530
// RegisterPermissionHandlerServer registers the http handlers for service Permission to "mux".
1531
// UnaryRPC     :call PermissionServer directly.
1532
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1533
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterPermissionHandlerFromEndpoint instead.
1534
func RegisterPermissionHandlerServer(ctx context.Context, mux *runtime.ServeMux, server PermissionServer) error {
1535
1536
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1537
		ctx, cancel := context.WithCancel(req.Context())
1538
		defer cancel()
1539
		var stream runtime.ServerTransportStream
1540
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1541
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1542
		var err error
1543
		var annotatedContext context.Context
1544
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
1545
		if err != nil {
1546
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1547
			return
1548
		}
1549
		resp, md, err := local_request_Permission_Check_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1550
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1551
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1552
		if err != nil {
1553
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1554
			return
1555
		}
1556
1557
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1558
1559
	})
1560
1561
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1562
		ctx, cancel := context.WithCancel(req.Context())
1563
		defer cancel()
1564
		var stream runtime.ServerTransportStream
1565
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1566
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1567
		var err error
1568
		var annotatedContext context.Context
1569
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
1570
		if err != nil {
1571
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1572
			return
1573
		}
1574
		resp, md, err := local_request_Permission_Expand_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1575
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1576
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1577
		if err != nil {
1578
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1579
			return
1580
		}
1581
1582
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1583
1584
	})
1585
1586
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1587
		ctx, cancel := context.WithCancel(req.Context())
1588
		defer cancel()
1589
		var stream runtime.ServerTransportStream
1590
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1591
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1592
		var err error
1593
		var annotatedContext context.Context
1594
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
1595
		if err != nil {
1596
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1597
			return
1598
		}
1599
		resp, md, err := local_request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1600
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1601
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1602
		if err != nil {
1603
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1604
			return
1605
		}
1606
1607
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1608
1609
	})
1610
1611
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1612
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1613
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1614
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1615
		return
1616
	})
1617
1618
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1619
		ctx, cancel := context.WithCancel(req.Context())
1620
		defer cancel()
1621
		var stream runtime.ServerTransportStream
1622
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1623
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1624
		var err error
1625
		var annotatedContext context.Context
1626
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
1627
		if err != nil {
1628
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1629
			return
1630
		}
1631
		resp, md, err := local_request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1632
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1633
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1634
		if err != nil {
1635
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1636
			return
1637
		}
1638
1639
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1640
1641
	})
1642
1643
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1644
		ctx, cancel := context.WithCancel(req.Context())
1645
		defer cancel()
1646
		var stream runtime.ServerTransportStream
1647
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1648
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1649
		var err error
1650
		var annotatedContext context.Context
1651
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
1652
		if err != nil {
1653
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1654
			return
1655
		}
1656
		resp, md, err := local_request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1657
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1658
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1659
		if err != nil {
1660
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1661
			return
1662
		}
1663
1664
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1665
1666
	})
1667
1668
	return nil
1669
}
1670
1671
// RegisterWatchHandlerServer registers the http handlers for service Watch to "mux".
1672
// UnaryRPC     :call WatchServer directly.
1673
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1674
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterWatchHandlerFromEndpoint instead.
1675
func RegisterWatchHandlerServer(ctx context.Context, mux *runtime.ServeMux, server WatchServer) error {
1676
1677
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1678
		err := status.Error(codes.Unimplemented, "streaming calls are not yet supported in the in-process transport")
1679
		_, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1680
		runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1681
		return
1682
	})
1683
1684
	return nil
1685
}
1686
1687
// RegisterSchemaHandlerServer registers the http handlers for service Schema to "mux".
1688
// UnaryRPC     :call SchemaServer directly.
1689
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1690
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSchemaHandlerFromEndpoint instead.
1691
func RegisterSchemaHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SchemaServer) error {
1692
1693
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1694
		ctx, cancel := context.WithCancel(req.Context())
1695
		defer cancel()
1696
		var stream runtime.ServerTransportStream
1697
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1698
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1699
		var err error
1700
		var annotatedContext context.Context
1701
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
1702
		if err != nil {
1703
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1704
			return
1705
		}
1706
		resp, md, err := local_request_Schema_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1707
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1708
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1709
		if err != nil {
1710
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1711
			return
1712
		}
1713
1714
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1715
1716
	})
1717
1718
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1719
		ctx, cancel := context.WithCancel(req.Context())
1720
		defer cancel()
1721
		var stream runtime.ServerTransportStream
1722
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1723
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1724
		var err error
1725
		var annotatedContext context.Context
1726
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
1727
		if err != nil {
1728
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1729
			return
1730
		}
1731
		resp, md, err := local_request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1732
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1733
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1734
		if err != nil {
1735
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1736
			return
1737
		}
1738
1739
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1740
1741
	})
1742
1743
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1744
		ctx, cancel := context.WithCancel(req.Context())
1745
		defer cancel()
1746
		var stream runtime.ServerTransportStream
1747
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1748
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1749
		var err error
1750
		var annotatedContext context.Context
1751
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
1752
		if err != nil {
1753
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1754
			return
1755
		}
1756
		resp, md, err := local_request_Schema_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1757
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1758
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1759
		if err != nil {
1760
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1761
			return
1762
		}
1763
1764
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1765
1766
	})
1767
1768
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1769
		ctx, cancel := context.WithCancel(req.Context())
1770
		defer cancel()
1771
		var stream runtime.ServerTransportStream
1772
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1773
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1774
		var err error
1775
		var annotatedContext context.Context
1776
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
1777
		if err != nil {
1778
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1779
			return
1780
		}
1781
		resp, md, err := local_request_Schema_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1782
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1783
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1784
		if err != nil {
1785
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1786
			return
1787
		}
1788
1789
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1790
1791
	})
1792
1793
	return nil
1794
}
1795
1796
// RegisterDataHandlerServer registers the http handlers for service Data to "mux".
1797
// UnaryRPC     :call DataServer directly.
1798
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1799
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterDataHandlerFromEndpoint instead.
1800
func RegisterDataHandlerServer(ctx context.Context, mux *runtime.ServeMux, server DataServer) error {
1801
1802
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1803
		ctx, cancel := context.WithCancel(req.Context())
1804
		defer cancel()
1805
		var stream runtime.ServerTransportStream
1806
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1807
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1808
		var err error
1809
		var annotatedContext context.Context
1810
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
1811
		if err != nil {
1812
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1813
			return
1814
		}
1815
		resp, md, err := local_request_Data_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1816
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1817
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1818
		if err != nil {
1819
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1820
			return
1821
		}
1822
1823
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1824
1825
	})
1826
1827
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1828
		ctx, cancel := context.WithCancel(req.Context())
1829
		defer cancel()
1830
		var stream runtime.ServerTransportStream
1831
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1832
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1833
		var err error
1834
		var annotatedContext context.Context
1835
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
1836
		if err != nil {
1837
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1838
			return
1839
		}
1840
		resp, md, err := local_request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1841
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1842
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1843
		if err != nil {
1844
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1845
			return
1846
		}
1847
1848
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1849
1850
	})
1851
1852
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1853
		ctx, cancel := context.WithCancel(req.Context())
1854
		defer cancel()
1855
		var stream runtime.ServerTransportStream
1856
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1857
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1858
		var err error
1859
		var annotatedContext context.Context
1860
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
1861
		if err != nil {
1862
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1863
			return
1864
		}
1865
		resp, md, err := local_request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1866
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1867
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1868
		if err != nil {
1869
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1870
			return
1871
		}
1872
1873
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1874
1875
	})
1876
1877
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1878
		ctx, cancel := context.WithCancel(req.Context())
1879
		defer cancel()
1880
		var stream runtime.ServerTransportStream
1881
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1882
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1883
		var err error
1884
		var annotatedContext context.Context
1885
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
1886
		if err != nil {
1887
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1888
			return
1889
		}
1890
		resp, md, err := local_request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1891
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1892
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1893
		if err != nil {
1894
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1895
			return
1896
		}
1897
1898
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1899
1900
	})
1901
1902
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1903
		ctx, cancel := context.WithCancel(req.Context())
1904
		defer cancel()
1905
		var stream runtime.ServerTransportStream
1906
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1907
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1908
		var err error
1909
		var annotatedContext context.Context
1910
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
1911
		if err != nil {
1912
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1913
			return
1914
		}
1915
		resp, md, err := local_request_Data_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1916
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1917
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1918
		if err != nil {
1919
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1920
			return
1921
		}
1922
1923
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1924
1925
	})
1926
1927
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1928
		ctx, cancel := context.WithCancel(req.Context())
1929
		defer cancel()
1930
		var stream runtime.ServerTransportStream
1931
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1932
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1933
		var err error
1934
		var annotatedContext context.Context
1935
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
1936
		if err != nil {
1937
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1938
			return
1939
		}
1940
		resp, md, err := local_request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1941
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1942
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1943
		if err != nil {
1944
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1945
			return
1946
		}
1947
1948
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1949
1950
	})
1951
1952
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1953
		ctx, cancel := context.WithCancel(req.Context())
1954
		defer cancel()
1955
		var stream runtime.ServerTransportStream
1956
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1957
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1958
		var err error
1959
		var annotatedContext context.Context
1960
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
1961
		if err != nil {
1962
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1963
			return
1964
		}
1965
		resp, md, err := local_request_Data_RunBundle_0(annotatedContext, inboundMarshaler, server, req, pathParams)
1966
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
1967
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
1968
		if err != nil {
1969
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
1970
			return
1971
		}
1972
1973
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
1974
1975
	})
1976
1977
	return nil
1978
}
1979
1980
// RegisterBundleHandlerServer registers the http handlers for service Bundle to "mux".
1981
// UnaryRPC     :call BundleServer directly.
1982
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
1983
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterBundleHandlerFromEndpoint instead.
1984
func RegisterBundleHandlerServer(ctx context.Context, mux *runtime.ServeMux, server BundleServer) error {
1985
1986
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
1987
		ctx, cancel := context.WithCancel(req.Context())
1988
		defer cancel()
1989
		var stream runtime.ServerTransportStream
1990
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
1991
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
1992
		var err error
1993
		var annotatedContext context.Context
1994
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
1995
		if err != nil {
1996
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
1997
			return
1998
		}
1999
		resp, md, err := local_request_Bundle_Write_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2000
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2001
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2002
		if err != nil {
2003
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2004
			return
2005
		}
2006
2007
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2008
2009
	})
2010
2011
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2012
		ctx, cancel := context.WithCancel(req.Context())
2013
		defer cancel()
2014
		var stream runtime.ServerTransportStream
2015
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2016
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2017
		var err error
2018
		var annotatedContext context.Context
2019
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2020
		if err != nil {
2021
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2022
			return
2023
		}
2024
		resp, md, err := local_request_Bundle_Read_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2025
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2026
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2027
		if err != nil {
2028
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2029
			return
2030
		}
2031
2032
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2033
2034
	})
2035
2036
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2037
		ctx, cancel := context.WithCancel(req.Context())
2038
		defer cancel()
2039
		var stream runtime.ServerTransportStream
2040
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2041
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2042
		var err error
2043
		var annotatedContext context.Context
2044
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2045
		if err != nil {
2046
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2047
			return
2048
		}
2049
		resp, md, err := local_request_Bundle_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2050
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2051
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2052
		if err != nil {
2053
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2054
			return
2055
		}
2056
2057
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2058
2059
	})
2060
2061
	return nil
2062
}
2063
2064
// RegisterTenancyHandlerServer registers the http handlers for service Tenancy to "mux".
2065
// UnaryRPC     :call TenancyServer directly.
2066
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
2067
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterTenancyHandlerFromEndpoint instead.
2068
func RegisterTenancyHandlerServer(ctx context.Context, mux *runtime.ServeMux, server TenancyServer) error {
2069
2070
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2071
		ctx, cancel := context.WithCancel(req.Context())
2072
		defer cancel()
2073
		var stream runtime.ServerTransportStream
2074
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2075
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2076
		var err error
2077
		var annotatedContext context.Context
2078
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2079
		if err != nil {
2080
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2081
			return
2082
		}
2083
		resp, md, err := local_request_Tenancy_Create_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2084
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2085
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2086
		if err != nil {
2087
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2088
			return
2089
		}
2090
2091
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2092
2093
	})
2094
2095
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2096
		ctx, cancel := context.WithCancel(req.Context())
2097
		defer cancel()
2098
		var stream runtime.ServerTransportStream
2099
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2100
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2101
		var err error
2102
		var annotatedContext context.Context
2103
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2104
		if err != nil {
2105
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2106
			return
2107
		}
2108
		resp, md, err := local_request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2109
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2110
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2111
		if err != nil {
2112
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2113
			return
2114
		}
2115
2116
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2117
2118
	})
2119
2120
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2121
		ctx, cancel := context.WithCancel(req.Context())
2122
		defer cancel()
2123
		var stream runtime.ServerTransportStream
2124
		ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
2125
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2126
		var err error
2127
		var annotatedContext context.Context
2128
		annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
2129
		if err != nil {
2130
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2131
			return
2132
		}
2133
		resp, md, err := local_request_Tenancy_List_0(annotatedContext, inboundMarshaler, server, req, pathParams)
2134
		md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
2135
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2136
		if err != nil {
2137
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2138
			return
2139
		}
2140
2141
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2142
2143
	})
2144
2145
	return nil
2146
}
2147
2148
// RegisterPermissionHandlerFromEndpoint is same as RegisterPermissionHandler but
2149
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2150
func RegisterPermissionHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2151
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2152
	if err != nil {
2153
		return err
2154
	}
2155
	defer func() {
2156
		if err != nil {
2157
			if cerr := conn.Close(); cerr != nil {
2158
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2159
			}
2160
			return
2161
		}
2162
		go func() {
2163
			<-ctx.Done()
2164
			if cerr := conn.Close(); cerr != nil {
2165
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2166
			}
2167
		}()
2168
	}()
2169
2170
	return RegisterPermissionHandler(ctx, mux, conn)
2171
}
2172
2173
// RegisterPermissionHandler registers the http handlers for service Permission to "mux".
2174
// The handlers forward requests to the grpc endpoint over "conn".
2175
func RegisterPermissionHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2176
	return RegisterPermissionHandlerClient(ctx, mux, NewPermissionClient(conn))
2177
}
2178
2179
// RegisterPermissionHandlerClient registers the http handlers for service Permission
2180
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "PermissionClient".
2181
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "PermissionClient"
2182
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2183
// "PermissionClient" to call the correct interceptors.
2184
func RegisterPermissionHandlerClient(ctx context.Context, mux *runtime.ServeMux, client PermissionClient) error {
2185
2186
	mux.Handle("POST", pattern_Permission_Check_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2187
		ctx, cancel := context.WithCancel(req.Context())
2188
		defer cancel()
2189
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2190
		var err error
2191
		var annotatedContext context.Context
2192
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Check", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/check"))
2193
		if err != nil {
2194
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2195
			return
2196
		}
2197
		resp, md, err := request_Permission_Check_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2198
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2199
		if err != nil {
2200
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2201
			return
2202
		}
2203
2204
		forward_Permission_Check_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2205
2206
	})
2207
2208
	mux.Handle("POST", pattern_Permission_Expand_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2209
		ctx, cancel := context.WithCancel(req.Context())
2210
		defer cancel()
2211
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2212
		var err error
2213
		var annotatedContext context.Context
2214
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/Expand", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/expand"))
2215
		if err != nil {
2216
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2217
			return
2218
		}
2219
		resp, md, err := request_Permission_Expand_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2220
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2221
		if err != nil {
2222
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2223
			return
2224
		}
2225
2226
		forward_Permission_Expand_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2227
2228
	})
2229
2230
	mux.Handle("POST", pattern_Permission_LookupEntity_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2231
		ctx, cancel := context.WithCancel(req.Context())
2232
		defer cancel()
2233
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2234
		var err error
2235
		var annotatedContext context.Context
2236
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntity", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity"))
2237
		if err != nil {
2238
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2239
			return
2240
		}
2241
		resp, md, err := request_Permission_LookupEntity_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2242
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2243
		if err != nil {
2244
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2245
			return
2246
		}
2247
2248
		forward_Permission_LookupEntity_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2249
2250
	})
2251
2252
	mux.Handle("POST", pattern_Permission_LookupEntityStream_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2253
		ctx, cancel := context.WithCancel(req.Context())
2254
		defer cancel()
2255
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2256
		var err error
2257
		var annotatedContext context.Context
2258
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupEntityStream", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-entity-stream"))
2259
		if err != nil {
2260
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2261
			return
2262
		}
2263
		resp, md, err := request_Permission_LookupEntityStream_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2264
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2265
		if err != nil {
2266
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2267
			return
2268
		}
2269
2270
		forward_Permission_LookupEntityStream_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2271
2272
	})
2273
2274
	mux.Handle("POST", pattern_Permission_LookupSubject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2275
		ctx, cancel := context.WithCancel(req.Context())
2276
		defer cancel()
2277
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2278
		var err error
2279
		var annotatedContext context.Context
2280
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/LookupSubject", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/lookup-subject"))
2281
		if err != nil {
2282
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2283
			return
2284
		}
2285
		resp, md, err := request_Permission_LookupSubject_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2286
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2287
		if err != nil {
2288
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2289
			return
2290
		}
2291
2292
		forward_Permission_LookupSubject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2293
2294
	})
2295
2296
	mux.Handle("POST", pattern_Permission_SubjectPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2297
		ctx, cancel := context.WithCancel(req.Context())
2298
		defer cancel()
2299
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2300
		var err error
2301
		var annotatedContext context.Context
2302
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Permission/SubjectPermission", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/permissions/subject-permission"))
2303
		if err != nil {
2304
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2305
			return
2306
		}
2307
		resp, md, err := request_Permission_SubjectPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2308
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2309
		if err != nil {
2310
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2311
			return
2312
		}
2313
2314
		forward_Permission_SubjectPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2315
2316
	})
2317
2318
	return nil
2319
}
2320
2321
var (
2322
	pattern_Permission_Check_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "check"}, ""))
2323
2324
	pattern_Permission_Expand_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "expand"}, ""))
2325
2326
	pattern_Permission_LookupEntity_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity"}, ""))
2327
2328
	pattern_Permission_LookupEntityStream_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-entity-stream"}, ""))
2329
2330
	pattern_Permission_LookupSubject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "lookup-subject"}, ""))
2331
2332
	pattern_Permission_SubjectPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "permissions", "subject-permission"}, ""))
2333
)
2334
2335
var (
2336
	forward_Permission_Check_0 = runtime.ForwardResponseMessage
2337
2338
	forward_Permission_Expand_0 = runtime.ForwardResponseMessage
2339
2340
	forward_Permission_LookupEntity_0 = runtime.ForwardResponseMessage
2341
2342
	forward_Permission_LookupEntityStream_0 = runtime.ForwardResponseStream
2343
2344
	forward_Permission_LookupSubject_0 = runtime.ForwardResponseMessage
2345
2346
	forward_Permission_SubjectPermission_0 = runtime.ForwardResponseMessage
2347
)
2348
2349
// RegisterWatchHandlerFromEndpoint is same as RegisterWatchHandler but
2350
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2351
func RegisterWatchHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2352
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2353
	if err != nil {
2354
		return err
2355
	}
2356
	defer func() {
2357
		if err != nil {
2358
			if cerr := conn.Close(); cerr != nil {
2359
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2360
			}
2361
			return
2362
		}
2363
		go func() {
2364
			<-ctx.Done()
2365
			if cerr := conn.Close(); cerr != nil {
2366
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2367
			}
2368
		}()
2369
	}()
2370
2371
	return RegisterWatchHandler(ctx, mux, conn)
2372
}
2373
2374
// RegisterWatchHandler registers the http handlers for service Watch to "mux".
2375
// The handlers forward requests to the grpc endpoint over "conn".
2376
func RegisterWatchHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2377
	return RegisterWatchHandlerClient(ctx, mux, NewWatchClient(conn))
2378
}
2379
2380
// RegisterWatchHandlerClient registers the http handlers for service Watch
2381
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "WatchClient".
2382
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "WatchClient"
2383
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2384
// "WatchClient" to call the correct interceptors.
2385
func RegisterWatchHandlerClient(ctx context.Context, mux *runtime.ServeMux, client WatchClient) error {
2386
2387
	mux.Handle("POST", pattern_Watch_Watch_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2388
		ctx, cancel := context.WithCancel(req.Context())
2389
		defer cancel()
2390
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2391
		var err error
2392
		var annotatedContext context.Context
2393
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Watch/Watch", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/watch"))
2394
		if err != nil {
2395
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2396
			return
2397
		}
2398
		resp, md, err := request_Watch_Watch_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2399
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2400
		if err != nil {
2401
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2402
			return
2403
		}
2404
2405
		forward_Watch_Watch_0(annotatedContext, mux, outboundMarshaler, w, req, func() (proto.Message, error) { return resp.Recv() }, mux.GetForwardResponseOptions()...)
2406
2407
	})
2408
2409
	return nil
2410
}
2411
2412
var (
2413
	pattern_Watch_Watch_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1", "tenants", "tenant_id", "watch"}, ""))
2414
)
2415
2416
var (
2417
	forward_Watch_Watch_0 = runtime.ForwardResponseStream
2418
)
2419
2420
// RegisterSchemaHandlerFromEndpoint is same as RegisterSchemaHandler but
2421
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2422
func RegisterSchemaHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2423
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2424
	if err != nil {
2425
		return err
2426
	}
2427
	defer func() {
2428
		if err != nil {
2429
			if cerr := conn.Close(); cerr != nil {
2430
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2431
			}
2432
			return
2433
		}
2434
		go func() {
2435
			<-ctx.Done()
2436
			if cerr := conn.Close(); cerr != nil {
2437
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2438
			}
2439
		}()
2440
	}()
2441
2442
	return RegisterSchemaHandler(ctx, mux, conn)
2443
}
2444
2445
// RegisterSchemaHandler registers the http handlers for service Schema to "mux".
2446
// The handlers forward requests to the grpc endpoint over "conn".
2447
func RegisterSchemaHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2448
	return RegisterSchemaHandlerClient(ctx, mux, NewSchemaClient(conn))
2449
}
2450
2451
// RegisterSchemaHandlerClient registers the http handlers for service Schema
2452
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SchemaClient".
2453
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SchemaClient"
2454
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2455
// "SchemaClient" to call the correct interceptors.
2456
func RegisterSchemaHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SchemaClient) error {
2457
2458
	mux.Handle("POST", pattern_Schema_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2459
		ctx, cancel := context.WithCancel(req.Context())
2460
		defer cancel()
2461
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2462
		var err error
2463
		var annotatedContext context.Context
2464
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/write"))
2465
		if err != nil {
2466
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2467
			return
2468
		}
2469
		resp, md, err := request_Schema_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2470
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2471
		if err != nil {
2472
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2473
			return
2474
		}
2475
2476
		forward_Schema_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2477
2478
	})
2479
2480
	mux.Handle("PATCH", pattern_Schema_PartialWrite_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2481
		ctx, cancel := context.WithCancel(req.Context())
2482
		defer cancel()
2483
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2484
		var err error
2485
		var annotatedContext context.Context
2486
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/PartialWrite", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/partial-write"))
2487
		if err != nil {
2488
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2489
			return
2490
		}
2491
		resp, md, err := request_Schema_PartialWrite_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2492
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2493
		if err != nil {
2494
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2495
			return
2496
		}
2497
2498
		forward_Schema_PartialWrite_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2499
2500
	})
2501
2502
	mux.Handle("POST", pattern_Schema_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2503
		ctx, cancel := context.WithCancel(req.Context())
2504
		defer cancel()
2505
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2506
		var err error
2507
		var annotatedContext context.Context
2508
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/read"))
2509
		if err != nil {
2510
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2511
			return
2512
		}
2513
		resp, md, err := request_Schema_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2514
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2515
		if err != nil {
2516
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2517
			return
2518
		}
2519
2520
		forward_Schema_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2521
2522
	})
2523
2524
	mux.Handle("POST", pattern_Schema_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2525
		ctx, cancel := context.WithCancel(req.Context())
2526
		defer cancel()
2527
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2528
		var err error
2529
		var annotatedContext context.Context
2530
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Schema/List", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/schemas/list"))
2531
		if err != nil {
2532
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2533
			return
2534
		}
2535
		resp, md, err := request_Schema_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2536
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2537
		if err != nil {
2538
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2539
			return
2540
		}
2541
2542
		forward_Schema_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2543
2544
	})
2545
2546
	return nil
2547
}
2548
2549
var (
2550
	pattern_Schema_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "write"}, ""))
2551
2552
	pattern_Schema_PartialWrite_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "partial-write"}, ""))
2553
2554
	pattern_Schema_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "read"}, ""))
2555
2556
	pattern_Schema_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "schemas", "list"}, ""))
2557
)
2558
2559
var (
2560
	forward_Schema_Write_0 = runtime.ForwardResponseMessage
2561
2562
	forward_Schema_PartialWrite_0 = runtime.ForwardResponseMessage
2563
2564
	forward_Schema_Read_0 = runtime.ForwardResponseMessage
2565
2566
	forward_Schema_List_0 = runtime.ForwardResponseMessage
2567
)
2568
2569
// RegisterDataHandlerFromEndpoint is same as RegisterDataHandler but
2570
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2571
func RegisterDataHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2572
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2573
	if err != nil {
2574
		return err
2575
	}
2576
	defer func() {
2577
		if err != nil {
2578
			if cerr := conn.Close(); cerr != nil {
2579
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2580
			}
2581
			return
2582
		}
2583
		go func() {
2584
			<-ctx.Done()
2585
			if cerr := conn.Close(); cerr != nil {
2586
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2587
			}
2588
		}()
2589
	}()
2590
2591
	return RegisterDataHandler(ctx, mux, conn)
2592
}
2593
2594
// RegisterDataHandler registers the http handlers for service Data to "mux".
2595
// The handlers forward requests to the grpc endpoint over "conn".
2596
func RegisterDataHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2597
	return RegisterDataHandlerClient(ctx, mux, NewDataClient(conn))
2598
}
2599
2600
// RegisterDataHandlerClient registers the http handlers for service Data
2601
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "DataClient".
2602
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "DataClient"
2603
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2604
// "DataClient" to call the correct interceptors.
2605
func RegisterDataHandlerClient(ctx context.Context, mux *runtime.ServeMux, client DataClient) error {
2606
2607
	mux.Handle("POST", pattern_Data_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2608
		ctx, cancel := context.WithCancel(req.Context())
2609
		defer cancel()
2610
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2611
		var err error
2612
		var annotatedContext context.Context
2613
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/write"))
2614
		if err != nil {
2615
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2616
			return
2617
		}
2618
		resp, md, err := request_Data_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2619
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2620
		if err != nil {
2621
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2622
			return
2623
		}
2624
2625
		forward_Data_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2626
2627
	})
2628
2629
	mux.Handle("POST", pattern_Data_WriteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2630
		ctx, cancel := context.WithCancel(req.Context())
2631
		defer cancel()
2632
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2633
		var err error
2634
		var annotatedContext context.Context
2635
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/WriteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/write"))
2636
		if err != nil {
2637
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2638
			return
2639
		}
2640
		resp, md, err := request_Data_WriteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2641
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2642
		if err != nil {
2643
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2644
			return
2645
		}
2646
2647
		forward_Data_WriteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2648
2649
	})
2650
2651
	mux.Handle("POST", pattern_Data_ReadRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2652
		ctx, cancel := context.WithCancel(req.Context())
2653
		defer cancel()
2654
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2655
		var err error
2656
		var annotatedContext context.Context
2657
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/relationships/read"))
2658
		if err != nil {
2659
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2660
			return
2661
		}
2662
		resp, md, err := request_Data_ReadRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2663
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2664
		if err != nil {
2665
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2666
			return
2667
		}
2668
2669
		forward_Data_ReadRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2670
2671
	})
2672
2673
	mux.Handle("POST", pattern_Data_ReadAttributes_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2674
		ctx, cancel := context.WithCancel(req.Context())
2675
		defer cancel()
2676
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2677
		var err error
2678
		var annotatedContext context.Context
2679
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/ReadAttributes", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/attributes/read"))
2680
		if err != nil {
2681
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2682
			return
2683
		}
2684
		resp, md, err := request_Data_ReadAttributes_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2685
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2686
		if err != nil {
2687
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2688
			return
2689
		}
2690
2691
		forward_Data_ReadAttributes_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2692
2693
	})
2694
2695
	mux.Handle("POST", pattern_Data_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2696
		ctx, cancel := context.WithCancel(req.Context())
2697
		defer cancel()
2698
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2699
		var err error
2700
		var annotatedContext context.Context
2701
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/delete"))
2702
		if err != nil {
2703
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2704
			return
2705
		}
2706
		resp, md, err := request_Data_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2707
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2708
		if err != nil {
2709
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2710
			return
2711
		}
2712
2713
		forward_Data_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2714
2715
	})
2716
2717
	mux.Handle("POST", pattern_Data_DeleteRelationships_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2718
		ctx, cancel := context.WithCancel(req.Context())
2719
		defer cancel()
2720
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2721
		var err error
2722
		var annotatedContext context.Context
2723
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/DeleteRelationships", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/relationships/delete"))
2724
		if err != nil {
2725
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2726
			return
2727
		}
2728
		resp, md, err := request_Data_DeleteRelationships_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2729
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2730
		if err != nil {
2731
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2732
			return
2733
		}
2734
2735
		forward_Data_DeleteRelationships_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2736
2737
	})
2738
2739
	mux.Handle("POST", pattern_Data_RunBundle_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2740
		ctx, cancel := context.WithCancel(req.Context())
2741
		defer cancel()
2742
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2743
		var err error
2744
		var annotatedContext context.Context
2745
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Data/RunBundle", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/data/run-bundle"))
2746
		if err != nil {
2747
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2748
			return
2749
		}
2750
		resp, md, err := request_Data_RunBundle_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2751
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2752
		if err != nil {
2753
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2754
			return
2755
		}
2756
2757
		forward_Data_RunBundle_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2758
2759
	})
2760
2761
	return nil
2762
}
2763
2764
var (
2765
	pattern_Data_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "write"}, ""))
2766
2767
	pattern_Data_WriteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "write"}, ""))
2768
2769
	pattern_Data_ReadRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "relationships", "read"}, ""))
2770
2771
	pattern_Data_ReadAttributes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4, 2, 5}, []string{"v1", "tenants", "tenant_id", "data", "attributes", "read"}, ""))
2772
2773
	pattern_Data_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "delete"}, ""))
2774
2775
	pattern_Data_DeleteRelationships_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "relationships", "delete"}, ""))
2776
2777
	pattern_Data_RunBundle_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "data", "run-bundle"}, ""))
2778
)
2779
2780
var (
2781
	forward_Data_Write_0 = runtime.ForwardResponseMessage
2782
2783
	forward_Data_WriteRelationships_0 = runtime.ForwardResponseMessage
2784
2785
	forward_Data_ReadRelationships_0 = runtime.ForwardResponseMessage
2786
2787
	forward_Data_ReadAttributes_0 = runtime.ForwardResponseMessage
2788
2789
	forward_Data_Delete_0 = runtime.ForwardResponseMessage
2790
2791
	forward_Data_DeleteRelationships_0 = runtime.ForwardResponseMessage
2792
2793
	forward_Data_RunBundle_0 = runtime.ForwardResponseMessage
2794
)
2795
2796
// RegisterBundleHandlerFromEndpoint is same as RegisterBundleHandler but
2797
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2798
func RegisterBundleHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2799
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2800
	if err != nil {
2801
		return err
2802
	}
2803
	defer func() {
2804
		if err != nil {
2805
			if cerr := conn.Close(); cerr != nil {
2806
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2807
			}
2808
			return
2809
		}
2810
		go func() {
2811
			<-ctx.Done()
2812
			if cerr := conn.Close(); cerr != nil {
2813
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2814
			}
2815
		}()
2816
	}()
2817
2818
	return RegisterBundleHandler(ctx, mux, conn)
2819
}
2820
2821
// RegisterBundleHandler registers the http handlers for service Bundle to "mux".
2822
// The handlers forward requests to the grpc endpoint over "conn".
2823
func RegisterBundleHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2824
	return RegisterBundleHandlerClient(ctx, mux, NewBundleClient(conn))
2825
}
2826
2827
// RegisterBundleHandlerClient registers the http handlers for service Bundle
2828
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "BundleClient".
2829
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "BundleClient"
2830
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2831
// "BundleClient" to call the correct interceptors.
2832
func RegisterBundleHandlerClient(ctx context.Context, mux *runtime.ServeMux, client BundleClient) error {
2833
2834
	mux.Handle("POST", pattern_Bundle_Write_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2835
		ctx, cancel := context.WithCancel(req.Context())
2836
		defer cancel()
2837
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2838
		var err error
2839
		var annotatedContext context.Context
2840
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Write", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/write"))
2841
		if err != nil {
2842
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2843
			return
2844
		}
2845
		resp, md, err := request_Bundle_Write_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2846
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2847
		if err != nil {
2848
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2849
			return
2850
		}
2851
2852
		forward_Bundle_Write_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2853
2854
	})
2855
2856
	mux.Handle("POST", pattern_Bundle_Read_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2857
		ctx, cancel := context.WithCancel(req.Context())
2858
		defer cancel()
2859
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2860
		var err error
2861
		var annotatedContext context.Context
2862
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Read", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/read"))
2863
		if err != nil {
2864
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2865
			return
2866
		}
2867
		resp, md, err := request_Bundle_Read_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2868
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2869
		if err != nil {
2870
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2871
			return
2872
		}
2873
2874
		forward_Bundle_Read_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2875
2876
	})
2877
2878
	mux.Handle("POST", pattern_Bundle_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2879
		ctx, cancel := context.WithCancel(req.Context())
2880
		defer cancel()
2881
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2882
		var err error
2883
		var annotatedContext context.Context
2884
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Bundle/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{tenant_id}/bundle/delete"))
2885
		if err != nil {
2886
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2887
			return
2888
		}
2889
		resp, md, err := request_Bundle_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2890
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2891
		if err != nil {
2892
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2893
			return
2894
		}
2895
2896
		forward_Bundle_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2897
2898
	})
2899
2900
	return nil
2901
}
2902
2903
var (
2904
	pattern_Bundle_Write_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "write"}, ""))
2905
2906
	pattern_Bundle_Read_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "read"}, ""))
2907
2908
	pattern_Bundle_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 2, 4}, []string{"v1", "tenants", "tenant_id", "bundle", "delete"}, ""))
2909
)
2910
2911
var (
2912
	forward_Bundle_Write_0 = runtime.ForwardResponseMessage
2913
2914
	forward_Bundle_Read_0 = runtime.ForwardResponseMessage
2915
2916
	forward_Bundle_Delete_0 = runtime.ForwardResponseMessage
2917
)
2918
2919
// RegisterTenancyHandlerFromEndpoint is same as RegisterTenancyHandler but
2920
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
2921
func RegisterTenancyHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
2922
	conn, err := grpc.DialContext(ctx, endpoint, opts...)
2923
	if err != nil {
2924
		return err
2925
	}
2926
	defer func() {
2927
		if err != nil {
2928
			if cerr := conn.Close(); cerr != nil {
2929
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2930
			}
2931
			return
2932
		}
2933
		go func() {
2934
			<-ctx.Done()
2935
			if cerr := conn.Close(); cerr != nil {
2936
				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
2937
			}
2938
		}()
2939
	}()
2940
2941
	return RegisterTenancyHandler(ctx, mux, conn)
2942
}
2943
2944
// RegisterTenancyHandler registers the http handlers for service Tenancy to "mux".
2945
// The handlers forward requests to the grpc endpoint over "conn".
2946
func RegisterTenancyHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
2947
	return RegisterTenancyHandlerClient(ctx, mux, NewTenancyClient(conn))
2948
}
2949
2950
// RegisterTenancyHandlerClient registers the http handlers for service Tenancy
2951
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "TenancyClient".
2952
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "TenancyClient"
2953
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
2954
// "TenancyClient" to call the correct interceptors.
2955
func RegisterTenancyHandlerClient(ctx context.Context, mux *runtime.ServeMux, client TenancyClient) error {
2956
2957
	mux.Handle("POST", pattern_Tenancy_Create_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2958
		ctx, cancel := context.WithCancel(req.Context())
2959
		defer cancel()
2960
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2961
		var err error
2962
		var annotatedContext context.Context
2963
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Create", runtime.WithHTTPPathPattern("/v1/tenants/create"))
2964
		if err != nil {
2965
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2966
			return
2967
		}
2968
		resp, md, err := request_Tenancy_Create_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2969
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2970
		if err != nil {
2971
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2972
			return
2973
		}
2974
2975
		forward_Tenancy_Create_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2976
2977
	})
2978
2979
	mux.Handle("DELETE", pattern_Tenancy_Delete_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
2980
		ctx, cancel := context.WithCancel(req.Context())
2981
		defer cancel()
2982
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
2983
		var err error
2984
		var annotatedContext context.Context
2985
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/Delete", runtime.WithHTTPPathPattern("/v1/tenants/{id}"))
2986
		if err != nil {
2987
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
2988
			return
2989
		}
2990
		resp, md, err := request_Tenancy_Delete_0(annotatedContext, inboundMarshaler, client, req, pathParams)
2991
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
2992
		if err != nil {
2993
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
2994
			return
2995
		}
2996
2997
		forward_Tenancy_Delete_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
2998
2999
	})
3000
3001
	mux.Handle("POST", pattern_Tenancy_List_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
3002
		ctx, cancel := context.WithCancel(req.Context())
3003
		defer cancel()
3004
		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
3005
		var err error
3006
		var annotatedContext context.Context
3007
		annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/base.v1.Tenancy/List", runtime.WithHTTPPathPattern("/v1/tenants/list"))
3008
		if err != nil {
3009
			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
3010
			return
3011
		}
3012
		resp, md, err := request_Tenancy_List_0(annotatedContext, inboundMarshaler, client, req, pathParams)
3013
		annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md)
3014
		if err != nil {
3015
			runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err)
3016
			return
3017
		}
3018
3019
		forward_Tenancy_List_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
3020
3021
	})
3022
3023
	return nil
3024
}
3025
3026
var (
3027
	pattern_Tenancy_Create_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "create"}, ""))
3028
3029
	pattern_Tenancy_Delete_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1", "tenants", "id"}, ""))
3030
3031
	pattern_Tenancy_List_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "tenants", "list"}, ""))
3032
)
3033
3034
var (
3035
	forward_Tenancy_Create_0 = runtime.ForwardResponseMessage
3036
3037
	forward_Tenancy_Delete_0 = runtime.ForwardResponseMessage
3038
3039
	forward_Tenancy_List_0 = runtime.ForwardResponseMessage
3040
)
3041