v3lock.pb.gw.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. // Code generated by protoc-gen-grpc-gateway
  2. // source: etcdserver/api/v3lock/v3lockpb/v3lock.proto
  3. // DO NOT EDIT!
  4. /*
  5. Package v3lockpb is a reverse proxy.
  6. It translates gRPC into RESTful JSON APIs.
  7. */
  8. package gw
  9. import (
  10. "github.com/coreos/etcd/etcdserver/api/v3lock/v3lockpb"
  11. "io"
  12. "net/http"
  13. "github.com/golang/protobuf/proto"
  14. "github.com/grpc-ecosystem/grpc-gateway/runtime"
  15. "github.com/grpc-ecosystem/grpc-gateway/utilities"
  16. "golang.org/x/net/context"
  17. "google.golang.org/grpc"
  18. "google.golang.org/grpc/codes"
  19. "google.golang.org/grpc/grpclog"
  20. )
  21. var _ codes.Code
  22. var _ io.Reader
  23. var _ = runtime.String
  24. var _ = utilities.NewDoubleArray
  25. func request_Lock_Lock_0(ctx context.Context, marshaler runtime.Marshaler, client v3lockpb.LockClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  26. var protoReq v3lockpb.LockRequest
  27. var metadata runtime.ServerMetadata
  28. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  29. return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
  30. }
  31. msg, err := client.Lock(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  32. return msg, metadata, err
  33. }
  34. func request_Lock_Unlock_0(ctx context.Context, marshaler runtime.Marshaler, client v3lockpb.LockClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
  35. var protoReq v3lockpb.UnlockRequest
  36. var metadata runtime.ServerMetadata
  37. if err := marshaler.NewDecoder(req.Body).Decode(&protoReq); err != nil {
  38. return nil, metadata, grpc.Errorf(codes.InvalidArgument, "%v", err)
  39. }
  40. msg, err := client.Unlock(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
  41. return msg, metadata, err
  42. }
  43. // RegisterLockHandlerFromEndpoint is same as RegisterLockHandler but
  44. // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
  45. func RegisterLockHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
  46. conn, err := grpc.Dial(endpoint, opts...)
  47. if err != nil {
  48. return err
  49. }
  50. defer func() {
  51. if err != nil {
  52. if cerr := conn.Close(); cerr != nil {
  53. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  54. }
  55. return
  56. }
  57. go func() {
  58. <-ctx.Done()
  59. if cerr := conn.Close(); cerr != nil {
  60. grpclog.Printf("Failed to close conn to %s: %v", endpoint, cerr)
  61. }
  62. }()
  63. }()
  64. return RegisterLockHandler(ctx, mux, conn)
  65. }
  66. // RegisterLockHandler registers the http handlers for service Lock to "mux".
  67. // The handlers forward requests to the grpc endpoint over "conn".
  68. func RegisterLockHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
  69. client := v3lockpb.NewLockClient(conn)
  70. mux.Handle("POST", pattern_Lock_Lock_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  71. ctx, cancel := context.WithCancel(ctx)
  72. defer cancel()
  73. if cn, ok := w.(http.CloseNotifier); ok {
  74. go func(done <-chan struct{}, closed <-chan bool) {
  75. select {
  76. case <-done:
  77. case <-closed:
  78. cancel()
  79. }
  80. }(ctx.Done(), cn.CloseNotify())
  81. }
  82. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  83. rctx, err := runtime.AnnotateContext(ctx, req)
  84. if err != nil {
  85. runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
  86. }
  87. resp, md, err := request_Lock_Lock_0(rctx, inboundMarshaler, client, req, pathParams)
  88. ctx = runtime.NewServerMetadataContext(ctx, md)
  89. if err != nil {
  90. runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
  91. return
  92. }
  93. forward_Lock_Lock_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  94. })
  95. mux.Handle("POST", pattern_Lock_Unlock_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
  96. ctx, cancel := context.WithCancel(ctx)
  97. defer cancel()
  98. if cn, ok := w.(http.CloseNotifier); ok {
  99. go func(done <-chan struct{}, closed <-chan bool) {
  100. select {
  101. case <-done:
  102. case <-closed:
  103. cancel()
  104. }
  105. }(ctx.Done(), cn.CloseNotify())
  106. }
  107. inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
  108. rctx, err := runtime.AnnotateContext(ctx, req)
  109. if err != nil {
  110. runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
  111. }
  112. resp, md, err := request_Lock_Unlock_0(rctx, inboundMarshaler, client, req, pathParams)
  113. ctx = runtime.NewServerMetadataContext(ctx, md)
  114. if err != nil {
  115. runtime.HTTPError(ctx, outboundMarshaler, w, req, err)
  116. return
  117. }
  118. forward_Lock_Unlock_0(ctx, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
  119. })
  120. return nil
  121. }
  122. var (
  123. pattern_Lock_Lock_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 1}, []string{"v3alpha", "lock"}, ""))
  124. pattern_Lock_Unlock_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v3alpha", "lock", "unlock"}, ""))
  125. )
  126. var (
  127. forward_Lock_Lock_0 = runtime.ForwardResponseMessage
  128. forward_Lock_Unlock_0 = runtime.ForwardResponseMessage
  129. )