2022-10-28 17:15:33 -07:00
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
// source: node/v1/node.proto
/ *
Package nodev1 is a reverse proxy .
It translates gRPC into RESTful JSON APIs .
* /
package nodev1
import (
"context"
"io"
"net/http"
"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
"github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/grpclog"
"google.golang.org/grpc/metadata"
"google.golang.org/grpc/status"
"google.golang.org/protobuf/proto"
)
// Suppress "imported and not used" errors
var _ codes . Code
var _ io . Reader
var _ status . Status
var _ = runtime . String
var _ = utilities . NewDoubleArray
var _ = metadata . Join
func request_NodePrivilegedService_InjectGovernanceVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq InjectGovernanceVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . InjectGovernanceVAA ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_InjectGovernanceVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq InjectGovernanceVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . InjectGovernanceVAA ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_FindMissingMessages_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq FindMissingMessagesRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . FindMissingMessages ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_FindMissingMessages_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq FindMissingMessagesRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . FindMissingMessages ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_SendObservationRequest_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq SendObservationRequestRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . SendObservationRequest ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_SendObservationRequest_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq SendObservationRequestRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . SendObservationRequest ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_ChainGovernorStatus_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorStatusRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . ChainGovernorStatus ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_ChainGovernorStatus_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorStatusRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . ChainGovernorStatus ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_ChainGovernorReload_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorReloadRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . ChainGovernorReload ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_ChainGovernorReload_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorReloadRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . ChainGovernorReload ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorDropPendingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . ChainGovernorDropPendingVAA ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorDropPendingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . ChainGovernorDropPendingVAA ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorReleasePendingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . ChainGovernorReleasePendingVAA ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorReleasePendingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . ChainGovernorReleasePendingVAA ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorResetReleaseTimerRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . ChainGovernorResetReleaseTimer ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq ChainGovernorResetReleaseTimerRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . ChainGovernorResetReleaseTimer ( ctx , & protoReq )
return msg , metadata , err
}
func request_NodePrivilegedService_PurgePythNetVaas_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq PurgePythNetVaasRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . PurgePythNetVaas ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_PurgePythNetVaas_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq PurgePythNetVaasRequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . PurgePythNetVaas ( ctx , & protoReq )
return msg , metadata , err
}
2023-01-10 08:54:35 -08:00
func request_NodePrivilegedService_SignExistingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , client NodePrivilegedServiceClient , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq SignExistingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := client . SignExistingVAA ( ctx , & protoReq , grpc . Header ( & metadata . HeaderMD ) , grpc . Trailer ( & metadata . TrailerMD ) )
return msg , metadata , err
}
func local_request_NodePrivilegedService_SignExistingVAA_0 ( ctx context . Context , marshaler runtime . Marshaler , server NodePrivilegedServiceServer , req * http . Request , pathParams map [ string ] string ) ( proto . Message , runtime . ServerMetadata , error ) {
var protoReq SignExistingVAARequest
var metadata runtime . ServerMetadata
newReader , berr := utilities . IOReaderFactory ( req . Body )
if berr != nil {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , berr )
}
if err := marshaler . NewDecoder ( newReader ( ) ) . Decode ( & protoReq ) ; err != nil && err != io . EOF {
return nil , metadata , status . Errorf ( codes . InvalidArgument , "%v" , err )
}
msg , err := server . SignExistingVAA ( ctx , & protoReq )
return msg , metadata , err
}
2022-10-28 17:15:33 -07:00
// RegisterNodePrivilegedServiceHandlerServer registers the http handlers for service NodePrivilegedService to "mux".
// UnaryRPC :call NodePrivilegedServiceServer directly.
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterNodePrivilegedServiceHandlerFromEndpoint instead.
func RegisterNodePrivilegedServiceHandlerServer ( ctx context . Context , mux * runtime . ServeMux , server NodePrivilegedServiceServer ) error {
mux . Handle ( "POST" , pattern_NodePrivilegedService_InjectGovernanceVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/InjectGovernanceVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/InjectGovernanceVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_InjectGovernanceVAA_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_InjectGovernanceVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_FindMissingMessages_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/FindMissingMessages" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/FindMissingMessages" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_FindMissingMessages_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_FindMissingMessages_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_SendObservationRequest_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/SendObservationRequest" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/SendObservationRequest" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_SendObservationRequest_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_SendObservationRequest_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorStatus_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorStatus" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorStatus" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_ChainGovernorStatus_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorStatus_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorReload_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorReload" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorReload" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_ChainGovernorReload_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorReload_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorDropPendingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_PurgePythNetVaas_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/PurgePythNetVaas" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/PurgePythNetVaas" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_PurgePythNetVaas_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_PurgePythNetVaas_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
2023-01-10 08:54:35 -08:00
mux . Handle ( "POST" , pattern_NodePrivilegedService_SignExistingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
var stream runtime . ServerTransportStream
ctx = grpc . NewContextWithServerTransportStream ( ctx , & stream )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateIncomingContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/SignExistingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/SignExistingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := local_request_NodePrivilegedService_SignExistingVAA_0 ( rctx , inboundMarshaler , server , req , pathParams )
md . HeaderMD , md . TrailerMD = metadata . Join ( md . HeaderMD , stream . Header ( ) ) , metadata . Join ( md . TrailerMD , stream . Trailer ( ) )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_SignExistingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
2022-10-28 17:15:33 -07:00
return nil
}
// RegisterNodePrivilegedServiceHandlerFromEndpoint is same as RegisterNodePrivilegedServiceHandler but
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
func RegisterNodePrivilegedServiceHandlerFromEndpoint ( ctx context . Context , mux * runtime . ServeMux , endpoint string , opts [ ] grpc . DialOption ) ( err error ) {
conn , err := grpc . Dial ( endpoint , opts ... )
if err != nil {
return err
}
defer func ( ) {
if err != nil {
if cerr := conn . Close ( ) ; cerr != nil {
grpclog . Infof ( "Failed to close conn to %s: %v" , endpoint , cerr )
}
return
}
go func ( ) {
<- ctx . Done ( )
if cerr := conn . Close ( ) ; cerr != nil {
grpclog . Infof ( "Failed to close conn to %s: %v" , endpoint , cerr )
}
} ( )
} ( )
return RegisterNodePrivilegedServiceHandler ( ctx , mux , conn )
}
// RegisterNodePrivilegedServiceHandler registers the http handlers for service NodePrivilegedService to "mux".
// The handlers forward requests to the grpc endpoint over "conn".
func RegisterNodePrivilegedServiceHandler ( ctx context . Context , mux * runtime . ServeMux , conn * grpc . ClientConn ) error {
return RegisterNodePrivilegedServiceHandlerClient ( ctx , mux , NewNodePrivilegedServiceClient ( conn ) )
}
// RegisterNodePrivilegedServiceHandlerClient registers the http handlers for service NodePrivilegedService
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "NodePrivilegedServiceClient".
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "NodePrivilegedServiceClient"
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
// "NodePrivilegedServiceClient" to call the correct interceptors.
func RegisterNodePrivilegedServiceHandlerClient ( ctx context . Context , mux * runtime . ServeMux , client NodePrivilegedServiceClient ) error {
mux . Handle ( "POST" , pattern_NodePrivilegedService_InjectGovernanceVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/InjectGovernanceVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/InjectGovernanceVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_InjectGovernanceVAA_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_InjectGovernanceVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_FindMissingMessages_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/FindMissingMessages" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/FindMissingMessages" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_FindMissingMessages_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_FindMissingMessages_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_SendObservationRequest_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/SendObservationRequest" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/SendObservationRequest" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_SendObservationRequest_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_SendObservationRequest_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorStatus_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorStatus" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorStatus" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_ChainGovernorStatus_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorStatus_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorReload_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorReload" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorReload" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_ChainGovernorReload_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorReload_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorDropPendingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorDropPendingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
mux . Handle ( "POST" , pattern_NodePrivilegedService_PurgePythNetVaas_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/PurgePythNetVaas" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/PurgePythNetVaas" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_PurgePythNetVaas_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_PurgePythNetVaas_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
2023-01-10 08:54:35 -08:00
mux . Handle ( "POST" , pattern_NodePrivilegedService_SignExistingVAA_0 , func ( w http . ResponseWriter , req * http . Request , pathParams map [ string ] string ) {
ctx , cancel := context . WithCancel ( req . Context ( ) )
defer cancel ( )
inboundMarshaler , outboundMarshaler := runtime . MarshalerForRequest ( mux , req )
rctx , err := runtime . AnnotateContext ( ctx , mux , req , "/node.v1.NodePrivilegedService/SignExistingVAA" , runtime . WithHTTPPathPattern ( "/node.v1.NodePrivilegedService/SignExistingVAA" ) )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
resp , md , err := request_NodePrivilegedService_SignExistingVAA_0 ( rctx , inboundMarshaler , client , req , pathParams )
ctx = runtime . NewServerMetadataContext ( ctx , md )
if err != nil {
runtime . HTTPError ( ctx , mux , outboundMarshaler , w , req , err )
return
}
forward_NodePrivilegedService_SignExistingVAA_0 ( ctx , mux , outboundMarshaler , w , req , resp , mux . GetForwardResponseOptions ( ) ... )
} )
2022-10-28 17:15:33 -07:00
return nil
}
var (
pattern_NodePrivilegedService_InjectGovernanceVAA_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "InjectGovernanceVAA" } , "" ) )
pattern_NodePrivilegedService_FindMissingMessages_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "FindMissingMessages" } , "" ) )
pattern_NodePrivilegedService_SendObservationRequest_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "SendObservationRequest" } , "" ) )
pattern_NodePrivilegedService_ChainGovernorStatus_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "ChainGovernorStatus" } , "" ) )
pattern_NodePrivilegedService_ChainGovernorReload_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "ChainGovernorReload" } , "" ) )
pattern_NodePrivilegedService_ChainGovernorDropPendingVAA_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "ChainGovernorDropPendingVAA" } , "" ) )
pattern_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "ChainGovernorReleasePendingVAA" } , "" ) )
pattern_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "ChainGovernorResetReleaseTimer" } , "" ) )
pattern_NodePrivilegedService_PurgePythNetVaas_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "PurgePythNetVaas" } , "" ) )
2023-01-10 08:54:35 -08:00
pattern_NodePrivilegedService_SignExistingVAA_0 = runtime . MustPattern ( runtime . NewPattern ( 1 , [ ] int { 2 , 0 , 2 , 1 } , [ ] string { "node.v1.NodePrivilegedService" , "SignExistingVAA" } , "" ) )
2022-10-28 17:15:33 -07:00
)
var (
forward_NodePrivilegedService_InjectGovernanceVAA_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_FindMissingMessages_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_SendObservationRequest_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_ChainGovernorStatus_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_ChainGovernorReload_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_ChainGovernorDropPendingVAA_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_ChainGovernorReleasePendingVAA_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_ChainGovernorResetReleaseTimer_0 = runtime . ForwardResponseMessage
forward_NodePrivilegedService_PurgePythNetVaas_0 = runtime . ForwardResponseMessage
2023-01-10 08:54:35 -08:00
forward_NodePrivilegedService_SignExistingVAA_0 = runtime . ForwardResponseMessage
2022-10-28 17:15:33 -07:00
)