vpn.pb.gw.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204
  1. // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
  2. // source: vpn.proto
  3. /*
  4. Package pb is a reverse proxy.
  5. It translates gRPC into RESTful JSON APIs.
  6. */
  7. package pb
  8. import (
  9. "io"
  10. "net/http"
  11. "github.com/golang/protobuf/proto"
  12. "github.com/grpc-ecosystem/grpc-gateway/runtime"
  13. "github.com/grpc-ecosystem/grpc-gateway/utilities"
  14. "golang.org/x/net/context"
  15. "google.golang.org/grpc"
  16. "google.golang.org/grpc/codes"
  17. "google.golang.org/grpc/grpclog"
  18. "google.golang.org/grpc/status"
  19. )
  20. var _ codes.Code
  21. var _ io.Reader
  22. var _ status.Status
  23. var _ = runtime.String
  24. var _ = utilities.NewDoubleArray
  25. func request_VPNService_Status_0(ctx context.Context, marshaler runtime.Marshaler, client VPNServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  26. var protoReq VPNStatusRequest
  27. var metadata runtime.ServerMetadata
  28. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  29. return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
  30. }
  31. msg, err := client.Status(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  32. return msg, metadata, err
  33. }
  34. func request_VPNService_Init_0(ctx context.Context, marshaler runtime.Marshaler, client VPNServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  35. var protoReq VPNInitRequest
  36. var metadata runtime.ServerMetadata
  37. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  38. return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
  39. }
  40. msg, err := client.Init(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  41. return msg, metadata, err
  42. }
  43. func request_VPNService_Update_0(ctx context.Context, marshaler runtime.Marshaler, client VPNServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  44. var protoReq VPNUpdateRequest
  45. var metadata runtime.ServerMetadata
  46. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  47. return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
  48. }
  49. msg, err := client.Update(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  50. return msg, metadata, err
  51. }
  52. // RegisterVPNServiceHandlerFromEndpoint is same as RegisterVPNServiceHandler but
  53. // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  54. func RegisterVPNServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  55. conn, err := grpc.Dial(endpoint, opts...)
  56. if err != nil {
  57. return err
  58. }
  59. defer func() {
  60. if err != nil {
  61. if cerr := conn.Close(); cerr != nil {
  62. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  63. }
  64. return
  65. }
  66. go func() {
  67. <-ctx.Done()
  68. if cerr := conn.Close(); cerr != nil {
  69. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  70. }
  71. }()
  72. }()
  73. return RegisterVPNServiceHandler(ctx, mux, conn)
  74. }
  75. // RegisterVPNServiceHandler registers the http handlers for service VPNService to "mux".
  76. // The handlers forward requests to the grpc endpoint over "conn".
  77. func RegisterVPNServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  78. client := NewVPNServiceClient(conn)
  79. mux.Handle("POST", pattern_VPNService_Status_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  80. ctx, cancel := context.WithCancel(ctx)
  81. defer cancel()
  82. if cn, ok := w.(http.CloseNotifier); ok {
  83. go func(done <-chan struct{}, closed <-chan bool) {
  84. select {
  85. case <-done:
  86. case <-closed:
  87. cancel()
  88. }
  89. }(ctx.Done(), cn.CloseNotify())
  90. }
  91. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  92. rctx, err := runtime.AnnotateContext(ctx, mux, req)
  93. if err != nil {
  94. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  95. return
  96. }
  97. resp, md, err := request_VPNService_Status_0(rctx, inboundMarshaler, client, req, pathParams)
  98. ctx = runtime.NewServerMetadataContext(ctx, md)
  99. if err != nil {
  100. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  101. return
  102. }
  103. forward_VPNService_Status_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  104. })
  105. mux.Handle("POST", pattern_VPNService_Init_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  106. ctx, cancel := context.WithCancel(ctx)
  107. defer cancel()
  108. if cn, ok := w.(http.CloseNotifier); ok {
  109. go func(done <-chan struct{}, closed <-chan bool) {
  110. select {
  111. case <-done:
  112. case <-closed:
  113. cancel()
  114. }
  115. }(ctx.Done(), cn.CloseNotify())
  116. }
  117. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  118. rctx, err := runtime.AnnotateContext(ctx, mux, req)
  119. if err != nil {
  120. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  121. return
  122. }
  123. resp, md, err := request_VPNService_Init_0(rctx, inboundMarshaler, client, req, pathParams)
  124. ctx = runtime.NewServerMetadataContext(ctx, md)
  125. if err != nil {
  126. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  127. return
  128. }
  129. forward_VPNService_Init_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  130. })
  131. mux.Handle("POST", pattern_VPNService_Update_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  132. ctx, cancel := context.WithCancel(ctx)
  133. defer cancel()
  134. if cn, ok := w.(http.CloseNotifier); ok {
  135. go func(done <-chan struct{}, closed <-chan bool) {
  136. select {
  137. case <-done:
  138. case <-closed:
  139. cancel()
  140. }
  141. }(ctx.Done(), cn.CloseNotify())
  142. }
  143. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  144. rctx, err := runtime.AnnotateContext(ctx, mux, req)
  145. if err != nil {
  146. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  147. return
  148. }
  149. resp, md, err := request_VPNService_Update_0(rctx, inboundMarshaler, client, req, pathParams)
  150. ctx = runtime.NewServerMetadataContext(ctx, md)
  151. if err != nil {
  152. runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
  153. return
  154. }
  155. forward_VPNService_Update_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  156. })
  157. return nil
  158. }
  159. var (
  160. pattern_VPNService_Status_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "vpn", "status"}, ""))
  161. pattern_VPNService_Init_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "vpn", "init"}, ""))
  162. pattern_VPNService_Update_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1", "vpn", "update"}, ""))
  163. )
  164. var (
  165. forward_VPNService_Status_0 = runtime.ForwardResponseMessage
  166. forward_VPNService_Init_0 = runtime.ForwardResponseMessage
  167. forward_VPNService_Update_0 = runtime.ForwardResponseMessage
  168. )