auth.pb.gw.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
  2. // source: auth.proto
  3. /*
  4. Package pb is a reverse proxy.
  5. It translates gRPC into RESTful JSON APIs.
  6. */
  7. package pb
  8. import (
  9. "io"
  10. "net/http"
  11. "github.com/golang/protobuf/proto"
  12. "github.com/grpc-ecosystem/grpc-gateway/runtime"
  13. "github.com/grpc-ecosystem/grpc-gateway/utilities"
  14. "golang.org/x/net/context"
  15. "google.golang.org/grpc"
  16. "google.golang.org/grpc/codes"
  17. "google.golang.org/grpc/grpclog"
  18. "google.golang.org/grpc/status"
  19. )
  20. var _ codes.Code
  21. var _ io.Reader
  22. var _ status.Status
  23. var _ = runtime.String
  24. var _ = utilities.NewDoubleArray
  25. func request_AuthService_Status_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  26. var protoReq AuthStatusRequest
  27. var metadata runtime.ServerMetadata
  28. msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  29. return msg, metadata, err
  30. }
  31. func request_AuthService_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  32. var protoReq AuthAuthenticateRequest
  33. var metadata runtime.ServerMetadata
  34. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  35. return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
  36. }
  37. msg, err := client.Authenticate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  38. return msg, metadata, err
  39. }
  40. // RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but
  41. // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  42. func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  43. conn, err := grpc.Dial(endpoint, opts...)
  44. if err != nil {
  45. return err
  46. }
  47. defer func() {
  48. if err != nil {
  49. if cerr := conn.Close(); cerr != nil {
  50. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  51. }
  52. return
  53. }
  54. go func() {
  55. <-ctx.Done()
  56. if cerr := conn.Close(); cerr != nil {
  57. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  58. }
  59. }()
  60. }()
  61. return RegisterAuthServiceHandler(ctx, mux, conn)
  62. }
  63. // RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux".
  64. // The handlers forward requests to the grpc endpoint over "conn".
  65. func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  66. client := NewAuthServiceClient(conn)
  67. mux.Handle("GET", pattern_AuthService_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  68. ctx, cancel := context.WithCancel(ctx)
  69. defer cancel()
  70. if cn, ok := w.(http.CloseNotifier); ok {
  71. go func(done <-chan struct{}, closed <-chan bool) {
  72. select {
  73. case <-done:
  74. case <-closed:
  75. cancel()
  76. }
  77. }(ctx.Done(), cn.CloseNotify())
  78. }
  79. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  80. rctx, err := runtime.AnnotateContext(ctx, mux, req)
  81. if err != nil {
  82. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  83. return
  84. }
  85. resp, md, err := request_AuthService_Status_0(rctx, inboundMarshaler, client, req, pathParams)
  86. ctx = runtime.NewServerMetadataContext(ctx, md)
  87. if err != nil {
  88. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  89. return
  90. }
  91. forward_AuthService_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  92. })
  93. mux.Handle("POST", pattern_AuthService_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  94. ctx, cancel := context.WithCancel(ctx)
  95. defer cancel()
  96. if cn, ok := w.(http.CloseNotifier); ok {
  97. go func(done <-chan struct{}, closed <-chan bool) {
  98. select {
  99. case <-done:
  100. case <-closed:
  101. cancel()
  102. }
  103. }(ctx.Done(), cn.CloseNotify())
  104. }
  105. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  106. rctx, err := runtime.AnnotateContext(ctx, mux, req)
  107. if err != nil {
  108. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  109. return
  110. }
  111. resp, md, err := request_AuthService_Authenticate_0(rctx, inboundMarshaler, client, req, pathParams)
  112. ctx = runtime.NewServerMetadataContext(ctx, md)
  113. if err != nil {
  114. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  115. return
  116. }
  117. forward_AuthService_Authenticate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  118. })
  119. return nil
  120. }
  121. var (
  122. pattern_AuthService_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"api", "v1", "auth", "status"}, ""))
  123. pattern_AuthService_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"api", "v1", "auth", "authenticate"}, ""))
  124. )
  125. var (
  126. forward_AuthService_Status_0 = runtime.ForwardResponseMessage
  127. forward_AuthService_Authenticate_0 = runtime.ForwardResponseMessage
  128. )