mirror of
				https://github.com/onepanelio/onepanel.git
				synced 2025-10-31 16:56:19 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			164 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			164 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
 | |
| // source: auth.proto
 | |
| 
 | |
| /*
 | |
| Package api is a reverse proxy.
 | |
| 
 | |
| It translates gRPC into RESTful JSON APIs.
 | |
| */
 | |
| package api
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"github.com/golang/protobuf/descriptor"
 | |
| 	"github.com/golang/protobuf/proto"
 | |
| 	"github.com/grpc-ecosystem/grpc-gateway/runtime"
 | |
| 	"github.com/grpc-ecosystem/grpc-gateway/utilities"
 | |
| 	"google.golang.org/grpc"
 | |
| 	"google.golang.org/grpc/codes"
 | |
| 	"google.golang.org/grpc/grpclog"
 | |
| 	"google.golang.org/grpc/status"
 | |
| )
 | |
| 
 | |
| // Suppress "imported and not used" errors
 | |
| var _ codes.Code
 | |
| var _ io.Reader
 | |
| var _ status.Status
 | |
| var _ = runtime.String
 | |
| var _ = utilities.NewDoubleArray
 | |
| var _ = descriptor.ForMessage
 | |
| 
 | |
| func request_AuthService_IsValidToken_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
 | |
| 	var protoReq IsValidTokenRequest
 | |
| 	var metadata runtime.ServerMetadata
 | |
| 
 | |
| 	newReader, berr := utilities.IOReaderFactory(req.Body)
 | |
| 	if berr != nil {
 | |
| 		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
 | |
| 	}
 | |
| 	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq.Token); err != nil && err != io.EOF {
 | |
| 		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
 | |
| 	}
 | |
| 
 | |
| 	msg, err := client.IsValidToken(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
 | |
| 	return msg, metadata, err
 | |
| 
 | |
| }
 | |
| 
 | |
| func local_request_AuthService_IsValidToken_0(ctx context.Context, marshaler runtime.Marshaler, server AuthServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
 | |
| 	var protoReq IsValidTokenRequest
 | |
| 	var metadata runtime.ServerMetadata
 | |
| 
 | |
| 	newReader, berr := utilities.IOReaderFactory(req.Body)
 | |
| 	if berr != nil {
 | |
| 		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
 | |
| 	}
 | |
| 	if err := marshaler.NewDecoder(newReader()).Decode(&protoReq.Token); err != nil && err != io.EOF {
 | |
| 		return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
 | |
| 	}
 | |
| 
 | |
| 	msg, err := server.IsValidToken(ctx, &protoReq)
 | |
| 	return msg, metadata, err
 | |
| 
 | |
| }
 | |
| 
 | |
| // RegisterAuthServiceHandlerServer registers the http handlers for service AuthService to "mux".
 | |
| // UnaryRPC     :call AuthServiceServer directly.
 | |
| // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
 | |
| func RegisterAuthServiceHandlerServer(ctx context.Context, mux *runtime.ServeMux, server AuthServiceServer) error {
 | |
| 
 | |
| 	mux.Handle("POST", pattern_AuthService_IsValidToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
 | |
| 		ctx, cancel := context.WithCancel(req.Context())
 | |
| 		defer cancel()
 | |
| 		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
 | |
| 		rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req)
 | |
| 		if err != nil {
 | |
| 			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
 | |
| 			return
 | |
| 		}
 | |
| 		resp, md, err := local_request_AuthService_IsValidToken_0(rctx, inboundMarshaler, server, req, pathParams)
 | |
| 		ctx = runtime.NewServerMetadataContext(ctx, md)
 | |
| 		if err != nil {
 | |
| 			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		forward_AuthService_IsValidToken_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
 | |
| 
 | |
| 	})
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but
 | |
| // automatically dials to "endpoint" and closes the connection when "ctx" gets done.
 | |
| func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
 | |
| 	conn, err := grpc.Dial(endpoint, opts...)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer func() {
 | |
| 		if err != nil {
 | |
| 			if cerr := conn.Close(); cerr != nil {
 | |
| 				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 		go func() {
 | |
| 			<-ctx.Done()
 | |
| 			if cerr := conn.Close(); cerr != nil {
 | |
| 				grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
 | |
| 			}
 | |
| 		}()
 | |
| 	}()
 | |
| 
 | |
| 	return RegisterAuthServiceHandler(ctx, mux, conn)
 | |
| }
 | |
| 
 | |
| // RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux".
 | |
| // The handlers forward requests to the grpc endpoint over "conn".
 | |
| func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
 | |
| 	return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn))
 | |
| }
 | |
| 
 | |
| // RegisterAuthServiceHandlerClient registers the http handlers for service AuthService
 | |
| // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient".
 | |
| // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient"
 | |
| // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
 | |
| // "AuthServiceClient" to call the correct interceptors.
 | |
| func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error {
 | |
| 
 | |
| 	mux.Handle("POST", pattern_AuthService_IsValidToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
 | |
| 		ctx, cancel := context.WithCancel(req.Context())
 | |
| 		defer cancel()
 | |
| 		inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
 | |
| 		rctx, err := runtime.AnnotateContext(ctx, mux, req)
 | |
| 		if err != nil {
 | |
| 			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
 | |
| 			return
 | |
| 		}
 | |
| 		resp, md, err := request_AuthService_IsValidToken_0(rctx, inboundMarshaler, client, req, pathParams)
 | |
| 		ctx = runtime.NewServerMetadataContext(ctx, md)
 | |
| 		if err != nil {
 | |
| 			runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		forward_AuthService_IsValidToken_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
 | |
| 
 | |
| 	})
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	pattern_AuthService_IsValidToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"apis", "v1beta1", "auth", "token"}, "", runtime.AssumeColonVerbOpt(true)))
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	forward_AuthService_IsValidToken_0 = runtime.ForwardResponseMessage
 | |
| )
 | 
