• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

lightningnetwork / lnd / 13412100018

19 Feb 2025 12:05PM UTC coverage: 44.914% (-13.9%) from 58.794%
13412100018

Pull #9521

github

web-flow
Merge 861d6970e into 0e8786348
Pull Request #9521: unit: remove GOACC, use Go 1.20 native coverage functionality

101023 of 224923 relevant lines covered (44.91%)

19479.4 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/lnrpc/signrpc/signer.pb.gw.go
1
// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT.
2
// source: signrpc/signer.proto
3

4
/*
5
Package signrpc is a reverse proxy.
6

7
It translates gRPC into RESTful JSON APIs.
8
*/
9
package signrpc
10

11
import (
12
        "context"
13
        "io"
14
        "net/http"
15

16
        "github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
17
        "github.com/grpc-ecosystem/grpc-gateway/v2/utilities"
18
        "google.golang.org/grpc"
19
        "google.golang.org/grpc/codes"
20
        "google.golang.org/grpc/grpclog"
21
        "google.golang.org/grpc/metadata"
22
        "google.golang.org/grpc/status"
23
        "google.golang.org/protobuf/proto"
24
)
25

26
// Suppress "imported and not used" errors
27
var _ codes.Code
28
var _ io.Reader
29
var _ status.Status
30
var _ = runtime.String
31
var _ = utilities.NewDoubleArray
32
var _ = metadata.Join
33

34
func request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
35
        var protoReq SignReq
×
36
        var metadata runtime.ServerMetadata
×
37

×
38
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
39
        if berr != nil {
×
40
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
41
        }
×
42
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
43
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
44
        }
×
45

46
        msg, err := client.SignOutputRaw(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
47
        return msg, metadata, err
×
48

49
}
50

51
func local_request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
52
        var protoReq SignReq
×
53
        var metadata runtime.ServerMetadata
×
54

×
55
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
56
        if berr != nil {
×
57
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
58
        }
×
59
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
60
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
61
        }
×
62

63
        msg, err := server.SignOutputRaw(ctx, &protoReq)
×
64
        return msg, metadata, err
×
65

66
}
67

68
func request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
69
        var protoReq SignReq
×
70
        var metadata runtime.ServerMetadata
×
71

×
72
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
73
        if berr != nil {
×
74
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
75
        }
×
76
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
77
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
78
        }
×
79

80
        msg, err := client.ComputeInputScript(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
81
        return msg, metadata, err
×
82

83
}
84

85
func local_request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
86
        var protoReq SignReq
×
87
        var metadata runtime.ServerMetadata
×
88

×
89
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
90
        if berr != nil {
×
91
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
92
        }
×
93
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
94
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
95
        }
×
96

97
        msg, err := server.ComputeInputScript(ctx, &protoReq)
×
98
        return msg, metadata, err
×
99

100
}
101

102
func request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
103
        var protoReq SignMessageReq
×
104
        var metadata runtime.ServerMetadata
×
105

×
106
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
107
        if berr != nil {
×
108
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
109
        }
×
110
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
111
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
112
        }
×
113

114
        msg, err := client.SignMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
115
        return msg, metadata, err
×
116

117
}
118

119
func local_request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
120
        var protoReq SignMessageReq
×
121
        var metadata runtime.ServerMetadata
×
122

×
123
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
124
        if berr != nil {
×
125
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
126
        }
×
127
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
128
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
129
        }
×
130

131
        msg, err := server.SignMessage(ctx, &protoReq)
×
132
        return msg, metadata, err
×
133

134
}
135

136
func request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
137
        var protoReq VerifyMessageReq
×
138
        var metadata runtime.ServerMetadata
×
139

×
140
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
141
        if berr != nil {
×
142
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
143
        }
×
144
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
145
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
146
        }
×
147

148
        msg, err := client.VerifyMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
149
        return msg, metadata, err
×
150

151
}
152

153
func local_request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
154
        var protoReq VerifyMessageReq
×
155
        var metadata runtime.ServerMetadata
×
156

×
157
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
158
        if berr != nil {
×
159
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
160
        }
×
161
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
162
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
163
        }
×
164

165
        msg, err := server.VerifyMessage(ctx, &protoReq)
×
166
        return msg, metadata, err
×
167

168
}
169

170
func request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
171
        var protoReq SharedKeyRequest
×
172
        var metadata runtime.ServerMetadata
×
173

×
174
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
175
        if berr != nil {
×
176
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
177
        }
×
178
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
179
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
180
        }
×
181

182
        msg, err := client.DeriveSharedKey(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
183
        return msg, metadata, err
×
184

185
}
186

187
func local_request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
188
        var protoReq SharedKeyRequest
×
189
        var metadata runtime.ServerMetadata
×
190

×
191
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
192
        if berr != nil {
×
193
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
194
        }
×
195
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
196
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
197
        }
×
198

199
        msg, err := server.DeriveSharedKey(ctx, &protoReq)
×
200
        return msg, metadata, err
×
201

202
}
203

204
func request_Signer_MuSig2CombineKeys_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
205
        var protoReq MuSig2CombineKeysRequest
×
206
        var metadata runtime.ServerMetadata
×
207

×
208
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
209
        if berr != nil {
×
210
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
211
        }
×
212
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
213
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
214
        }
×
215

216
        msg, err := client.MuSig2CombineKeys(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
217
        return msg, metadata, err
×
218

219
}
220

221
func local_request_Signer_MuSig2CombineKeys_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
222
        var protoReq MuSig2CombineKeysRequest
×
223
        var metadata runtime.ServerMetadata
×
224

×
225
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
226
        if berr != nil {
×
227
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
228
        }
×
229
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
230
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
231
        }
×
232

233
        msg, err := server.MuSig2CombineKeys(ctx, &protoReq)
×
234
        return msg, metadata, err
×
235

236
}
237

238
func request_Signer_MuSig2CreateSession_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
239
        var protoReq MuSig2SessionRequest
×
240
        var metadata runtime.ServerMetadata
×
241

×
242
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
243
        if berr != nil {
×
244
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
245
        }
×
246
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
247
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
248
        }
×
249

250
        msg, err := client.MuSig2CreateSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
251
        return msg, metadata, err
×
252

253
}
254

255
func local_request_Signer_MuSig2CreateSession_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
256
        var protoReq MuSig2SessionRequest
×
257
        var metadata runtime.ServerMetadata
×
258

×
259
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
260
        if berr != nil {
×
261
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
262
        }
×
263
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
264
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
265
        }
×
266

267
        msg, err := server.MuSig2CreateSession(ctx, &protoReq)
×
268
        return msg, metadata, err
×
269

270
}
271

272
func request_Signer_MuSig2RegisterNonces_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
273
        var protoReq MuSig2RegisterNoncesRequest
×
274
        var metadata runtime.ServerMetadata
×
275

×
276
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
277
        if berr != nil {
×
278
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
279
        }
×
280
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
281
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
282
        }
×
283

284
        msg, err := client.MuSig2RegisterNonces(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
285
        return msg, metadata, err
×
286

287
}
288

289
func local_request_Signer_MuSig2RegisterNonces_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
290
        var protoReq MuSig2RegisterNoncesRequest
×
291
        var metadata runtime.ServerMetadata
×
292

×
293
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
294
        if berr != nil {
×
295
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
296
        }
×
297
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
298
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
299
        }
×
300

301
        msg, err := server.MuSig2RegisterNonces(ctx, &protoReq)
×
302
        return msg, metadata, err
×
303

304
}
305

306
func request_Signer_MuSig2Sign_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
307
        var protoReq MuSig2SignRequest
×
308
        var metadata runtime.ServerMetadata
×
309

×
310
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
311
        if berr != nil {
×
312
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
313
        }
×
314
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
315
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
316
        }
×
317

318
        msg, err := client.MuSig2Sign(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
319
        return msg, metadata, err
×
320

321
}
322

323
func local_request_Signer_MuSig2Sign_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
324
        var protoReq MuSig2SignRequest
×
325
        var metadata runtime.ServerMetadata
×
326

×
327
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
328
        if berr != nil {
×
329
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
330
        }
×
331
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
332
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
333
        }
×
334

335
        msg, err := server.MuSig2Sign(ctx, &protoReq)
×
336
        return msg, metadata, err
×
337

338
}
339

340
func request_Signer_MuSig2CombineSig_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
341
        var protoReq MuSig2CombineSigRequest
×
342
        var metadata runtime.ServerMetadata
×
343

×
344
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
345
        if berr != nil {
×
346
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
347
        }
×
348
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
349
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
350
        }
×
351

352
        msg, err := client.MuSig2CombineSig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
353
        return msg, metadata, err
×
354

355
}
356

357
func local_request_Signer_MuSig2CombineSig_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
358
        var protoReq MuSig2CombineSigRequest
×
359
        var metadata runtime.ServerMetadata
×
360

×
361
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
362
        if berr != nil {
×
363
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
364
        }
×
365
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
366
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
367
        }
×
368

369
        msg, err := server.MuSig2CombineSig(ctx, &protoReq)
×
370
        return msg, metadata, err
×
371

372
}
373

374
func request_Signer_MuSig2Cleanup_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
375
        var protoReq MuSig2CleanupRequest
×
376
        var metadata runtime.ServerMetadata
×
377

×
378
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
379
        if berr != nil {
×
380
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
381
        }
×
382
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
383
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
384
        }
×
385

386
        msg, err := client.MuSig2Cleanup(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD))
×
387
        return msg, metadata, err
×
388

389
}
390

391
func local_request_Signer_MuSig2Cleanup_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) {
×
392
        var protoReq MuSig2CleanupRequest
×
393
        var metadata runtime.ServerMetadata
×
394

×
395
        newReader, berr := utilities.IOReaderFactory(req.Body)
×
396
        if berr != nil {
×
397
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr)
×
398
        }
×
399
        if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF {
×
400
                return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err)
×
401
        }
×
402

403
        msg, err := server.MuSig2Cleanup(ctx, &protoReq)
×
404
        return msg, metadata, err
×
405

406
}
407

408
// RegisterSignerHandlerServer registers the http handlers for service Signer to "mux".
409
// UnaryRPC     :call SignerServer directly.
410
// StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906.
411
// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSignerHandlerFromEndpoint instead.
412
func RegisterSignerHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SignerServer) error {
×
413

×
414
        mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
415
                ctx, cancel := context.WithCancel(req.Context())
×
416
                defer cancel()
×
417
                var stream runtime.ServerTransportStream
×
418
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
419
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
420
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw"))
×
421
                if err != nil {
×
422
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
423
                        return
×
424
                }
×
425
                resp, md, err := local_request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, server, req, pathParams)
×
426
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
427
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
428
                if err != nil {
×
429
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
430
                        return
×
431
                }
×
432

433
                forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
434

435
        })
436

437
        mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
438
                ctx, cancel := context.WithCancel(req.Context())
×
439
                defer cancel()
×
440
                var stream runtime.ServerTransportStream
×
441
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
442
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
443
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript"))
×
444
                if err != nil {
×
445
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
446
                        return
×
447
                }
×
448
                resp, md, err := local_request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, server, req, pathParams)
×
449
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
450
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
451
                if err != nil {
×
452
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
453
                        return
×
454
                }
×
455

456
                forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
457

458
        })
459

460
        mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
461
                ctx, cancel := context.WithCancel(req.Context())
×
462
                defer cancel()
×
463
                var stream runtime.ServerTransportStream
×
464
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
465
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
466
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage"))
×
467
                if err != nil {
×
468
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
469
                        return
×
470
                }
×
471
                resp, md, err := local_request_Signer_SignMessage_0(rctx, inboundMarshaler, server, req, pathParams)
×
472
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
473
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
474
                if err != nil {
×
475
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
476
                        return
×
477
                }
×
478

479
                forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
480

481
        })
482

483
        mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
484
                ctx, cancel := context.WithCancel(req.Context())
×
485
                defer cancel()
×
486
                var stream runtime.ServerTransportStream
×
487
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
488
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
489
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage"))
×
490
                if err != nil {
×
491
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
492
                        return
×
493
                }
×
494
                resp, md, err := local_request_Signer_VerifyMessage_0(rctx, inboundMarshaler, server, req, pathParams)
×
495
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
496
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
497
                if err != nil {
×
498
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
499
                        return
×
500
                }
×
501

502
                forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
503

504
        })
505

506
        mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
507
                ctx, cancel := context.WithCancel(req.Context())
×
508
                defer cancel()
×
509
                var stream runtime.ServerTransportStream
×
510
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
511
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
512
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey"))
×
513
                if err != nil {
×
514
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
515
                        return
×
516
                }
×
517
                resp, md, err := local_request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, server, req, pathParams)
×
518
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
519
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
520
                if err != nil {
×
521
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
522
                        return
×
523
                }
×
524

525
                forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
526

527
        })
528

529
        mux.Handle("POST", pattern_Signer_MuSig2CombineKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
530
                ctx, cancel := context.WithCancel(req.Context())
×
531
                defer cancel()
×
532
                var stream runtime.ServerTransportStream
×
533
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
534
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
535
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2CombineKeys", runtime.WithHTTPPathPattern("/v2/signer/musig2/combinekeys"))
×
536
                if err != nil {
×
537
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
538
                        return
×
539
                }
×
540
                resp, md, err := local_request_Signer_MuSig2CombineKeys_0(rctx, inboundMarshaler, server, req, pathParams)
×
541
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
542
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
543
                if err != nil {
×
544
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
545
                        return
×
546
                }
×
547

548
                forward_Signer_MuSig2CombineKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
549

550
        })
551

552
        mux.Handle("POST", pattern_Signer_MuSig2CreateSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
553
                ctx, cancel := context.WithCancel(req.Context())
×
554
                defer cancel()
×
555
                var stream runtime.ServerTransportStream
×
556
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
557
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
558
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2CreateSession", runtime.WithHTTPPathPattern("/v2/signer/musig2/createsession"))
×
559
                if err != nil {
×
560
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
561
                        return
×
562
                }
×
563
                resp, md, err := local_request_Signer_MuSig2CreateSession_0(rctx, inboundMarshaler, server, req, pathParams)
×
564
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
565
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
566
                if err != nil {
×
567
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
568
                        return
×
569
                }
×
570

571
                forward_Signer_MuSig2CreateSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
572

573
        })
574

575
        mux.Handle("POST", pattern_Signer_MuSig2RegisterNonces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
576
                ctx, cancel := context.WithCancel(req.Context())
×
577
                defer cancel()
×
578
                var stream runtime.ServerTransportStream
×
579
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
580
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
581
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2RegisterNonces", runtime.WithHTTPPathPattern("/v2/signer/musig2/registernonces"))
×
582
                if err != nil {
×
583
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
584
                        return
×
585
                }
×
586
                resp, md, err := local_request_Signer_MuSig2RegisterNonces_0(rctx, inboundMarshaler, server, req, pathParams)
×
587
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
588
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
589
                if err != nil {
×
590
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
591
                        return
×
592
                }
×
593

594
                forward_Signer_MuSig2RegisterNonces_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
595

596
        })
597

598
        mux.Handle("POST", pattern_Signer_MuSig2Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
599
                ctx, cancel := context.WithCancel(req.Context())
×
600
                defer cancel()
×
601
                var stream runtime.ServerTransportStream
×
602
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
603
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
604
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2Sign", runtime.WithHTTPPathPattern("/v2/signer/musig2/sign"))
×
605
                if err != nil {
×
606
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
607
                        return
×
608
                }
×
609
                resp, md, err := local_request_Signer_MuSig2Sign_0(rctx, inboundMarshaler, server, req, pathParams)
×
610
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
611
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
612
                if err != nil {
×
613
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
614
                        return
×
615
                }
×
616

617
                forward_Signer_MuSig2Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
618

619
        })
620

621
        mux.Handle("POST", pattern_Signer_MuSig2CombineSig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
622
                ctx, cancel := context.WithCancel(req.Context())
×
623
                defer cancel()
×
624
                var stream runtime.ServerTransportStream
×
625
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
626
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
627
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2CombineSig", runtime.WithHTTPPathPattern("/v2/signer/musig2/combinesig"))
×
628
                if err != nil {
×
629
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
630
                        return
×
631
                }
×
632
                resp, md, err := local_request_Signer_MuSig2CombineSig_0(rctx, inboundMarshaler, server, req, pathParams)
×
633
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
634
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
635
                if err != nil {
×
636
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
637
                        return
×
638
                }
×
639

640
                forward_Signer_MuSig2CombineSig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
641

642
        })
643

644
        mux.Handle("POST", pattern_Signer_MuSig2Cleanup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
645
                ctx, cancel := context.WithCancel(req.Context())
×
646
                defer cancel()
×
647
                var stream runtime.ServerTransportStream
×
648
                ctx = grpc.NewContextWithServerTransportStream(ctx, &stream)
×
649
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
650
                rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/MuSig2Cleanup", runtime.WithHTTPPathPattern("/v2/signer/musig2/cleanup"))
×
651
                if err != nil {
×
652
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
653
                        return
×
654
                }
×
655
                resp, md, err := local_request_Signer_MuSig2Cleanup_0(rctx, inboundMarshaler, server, req, pathParams)
×
656
                md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer())
×
657
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
658
                if err != nil {
×
659
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
660
                        return
×
661
                }
×
662

663
                forward_Signer_MuSig2Cleanup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
664

665
        })
666

667
        return nil
×
668
}
669

670
// RegisterSignerHandlerFromEndpoint is same as RegisterSignerHandler but
671
// automatically dials to "endpoint" and closes the connection when "ctx" gets done.
672
func RegisterSignerHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {
×
673
        conn, err := grpc.Dial(endpoint, opts...)
×
674
        if err != nil {
×
675
                return err
×
676
        }
×
677
        defer func() {
×
678
                if err != nil {
×
679
                        if cerr := conn.Close(); cerr != nil {
×
680
                                grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
×
681
                        }
×
682
                        return
×
683
                }
684
                go func() {
×
685
                        <-ctx.Done()
×
686
                        if cerr := conn.Close(); cerr != nil {
×
687
                                grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr)
×
688
                        }
×
689
                }()
690
        }()
691

692
        return RegisterSignerHandler(ctx, mux, conn)
×
693
}
694

695
// RegisterSignerHandler registers the http handlers for service Signer to "mux".
696
// The handlers forward requests to the grpc endpoint over "conn".
697
func RegisterSignerHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error {
×
698
        return RegisterSignerHandlerClient(ctx, mux, NewSignerClient(conn))
×
699
}
×
700

701
// RegisterSignerHandlerClient registers the http handlers for service Signer
702
// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SignerClient".
703
// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SignerClient"
704
// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in
705
// "SignerClient" to call the correct interceptors.
706
func RegisterSignerHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SignerClient) error {
×
707

×
708
        mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
709
                ctx, cancel := context.WithCancel(req.Context())
×
710
                defer cancel()
×
711
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
712
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw"))
×
713
                if err != nil {
×
714
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
715
                        return
×
716
                }
×
717
                resp, md, err := request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, client, req, pathParams)
×
718
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
719
                if err != nil {
×
720
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
721
                        return
×
722
                }
×
723

724
                forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
725

726
        })
727

728
        mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
729
                ctx, cancel := context.WithCancel(req.Context())
×
730
                defer cancel()
×
731
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
732
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript"))
×
733
                if err != nil {
×
734
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
735
                        return
×
736
                }
×
737
                resp, md, err := request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, client, req, pathParams)
×
738
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
739
                if err != nil {
×
740
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
741
                        return
×
742
                }
×
743

744
                forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
745

746
        })
747

748
        mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
749
                ctx, cancel := context.WithCancel(req.Context())
×
750
                defer cancel()
×
751
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
752
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage"))
×
753
                if err != nil {
×
754
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
755
                        return
×
756
                }
×
757
                resp, md, err := request_Signer_SignMessage_0(rctx, inboundMarshaler, client, req, pathParams)
×
758
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
759
                if err != nil {
×
760
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
761
                        return
×
762
                }
×
763

764
                forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
765

766
        })
767

768
        mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
769
                ctx, cancel := context.WithCancel(req.Context())
×
770
                defer cancel()
×
771
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
772
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage"))
×
773
                if err != nil {
×
774
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
775
                        return
×
776
                }
×
777
                resp, md, err := request_Signer_VerifyMessage_0(rctx, inboundMarshaler, client, req, pathParams)
×
778
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
779
                if err != nil {
×
780
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
781
                        return
×
782
                }
×
783

784
                forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
785

786
        })
787

788
        mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
789
                ctx, cancel := context.WithCancel(req.Context())
×
790
                defer cancel()
×
791
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
792
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey"))
×
793
                if err != nil {
×
794
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
795
                        return
×
796
                }
×
797
                resp, md, err := request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, client, req, pathParams)
×
798
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
799
                if err != nil {
×
800
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
801
                        return
×
802
                }
×
803

804
                forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
805

806
        })
807

808
        mux.Handle("POST", pattern_Signer_MuSig2CombineKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
809
                ctx, cancel := context.WithCancel(req.Context())
×
810
                defer cancel()
×
811
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
812
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2CombineKeys", runtime.WithHTTPPathPattern("/v2/signer/musig2/combinekeys"))
×
813
                if err != nil {
×
814
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
815
                        return
×
816
                }
×
817
                resp, md, err := request_Signer_MuSig2CombineKeys_0(rctx, inboundMarshaler, client, req, pathParams)
×
818
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
819
                if err != nil {
×
820
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
821
                        return
×
822
                }
×
823

824
                forward_Signer_MuSig2CombineKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
825

826
        })
827

828
        mux.Handle("POST", pattern_Signer_MuSig2CreateSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
829
                ctx, cancel := context.WithCancel(req.Context())
×
830
                defer cancel()
×
831
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
832
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2CreateSession", runtime.WithHTTPPathPattern("/v2/signer/musig2/createsession"))
×
833
                if err != nil {
×
834
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
835
                        return
×
836
                }
×
837
                resp, md, err := request_Signer_MuSig2CreateSession_0(rctx, inboundMarshaler, client, req, pathParams)
×
838
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
839
                if err != nil {
×
840
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
841
                        return
×
842
                }
×
843

844
                forward_Signer_MuSig2CreateSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
845

846
        })
847

848
        mux.Handle("POST", pattern_Signer_MuSig2RegisterNonces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
849
                ctx, cancel := context.WithCancel(req.Context())
×
850
                defer cancel()
×
851
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
852
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2RegisterNonces", runtime.WithHTTPPathPattern("/v2/signer/musig2/registernonces"))
×
853
                if err != nil {
×
854
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
855
                        return
×
856
                }
×
857
                resp, md, err := request_Signer_MuSig2RegisterNonces_0(rctx, inboundMarshaler, client, req, pathParams)
×
858
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
859
                if err != nil {
×
860
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
861
                        return
×
862
                }
×
863

864
                forward_Signer_MuSig2RegisterNonces_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
865

866
        })
867

868
        mux.Handle("POST", pattern_Signer_MuSig2Sign_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
869
                ctx, cancel := context.WithCancel(req.Context())
×
870
                defer cancel()
×
871
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
872
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2Sign", runtime.WithHTTPPathPattern("/v2/signer/musig2/sign"))
×
873
                if err != nil {
×
874
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
875
                        return
×
876
                }
×
877
                resp, md, err := request_Signer_MuSig2Sign_0(rctx, inboundMarshaler, client, req, pathParams)
×
878
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
879
                if err != nil {
×
880
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
881
                        return
×
882
                }
×
883

884
                forward_Signer_MuSig2Sign_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
885

886
        })
887

888
        mux.Handle("POST", pattern_Signer_MuSig2CombineSig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
889
                ctx, cancel := context.WithCancel(req.Context())
×
890
                defer cancel()
×
891
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
892
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2CombineSig", runtime.WithHTTPPathPattern("/v2/signer/musig2/combinesig"))
×
893
                if err != nil {
×
894
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
895
                        return
×
896
                }
×
897
                resp, md, err := request_Signer_MuSig2CombineSig_0(rctx, inboundMarshaler, client, req, pathParams)
×
898
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
899
                if err != nil {
×
900
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
901
                        return
×
902
                }
×
903

904
                forward_Signer_MuSig2CombineSig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
905

906
        })
907

908
        mux.Handle("POST", pattern_Signer_MuSig2Cleanup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {
×
909
                ctx, cancel := context.WithCancel(req.Context())
×
910
                defer cancel()
×
911
                inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)
×
912
                rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/MuSig2Cleanup", runtime.WithHTTPPathPattern("/v2/signer/musig2/cleanup"))
×
913
                if err != nil {
×
914
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
915
                        return
×
916
                }
×
917
                resp, md, err := request_Signer_MuSig2Cleanup_0(rctx, inboundMarshaler, client, req, pathParams)
×
918
                ctx = runtime.NewServerMetadataContext(ctx, md)
×
919
                if err != nil {
×
920
                        runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)
×
921
                        return
×
922
                }
×
923

924
                forward_Signer_MuSig2Cleanup_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)
×
925

926
        })
927

928
        return nil
×
929
}
930

931
var (
932
        pattern_Signer_SignOutputRaw_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signraw"}, ""))
933

934
        pattern_Signer_ComputeInputScript_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "inputscript"}, ""))
935

936
        pattern_Signer_SignMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signmessage"}, ""))
937

938
        pattern_Signer_VerifyMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "verifymessage"}, ""))
939

940
        pattern_Signer_DeriveSharedKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "sharedkey"}, ""))
941

942
        pattern_Signer_MuSig2CombineKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "combinekeys"}, ""))
943

944
        pattern_Signer_MuSig2CreateSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "createsession"}, ""))
945

946
        pattern_Signer_MuSig2RegisterNonces_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "registernonces"}, ""))
947

948
        pattern_Signer_MuSig2Sign_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "sign"}, ""))
949

950
        pattern_Signer_MuSig2CombineSig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "combinesig"}, ""))
951

952
        pattern_Signer_MuSig2Cleanup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v2", "signer", "musig2", "cleanup"}, ""))
953
)
954

955
var (
956
        forward_Signer_SignOutputRaw_0 = runtime.ForwardResponseMessage
957

958
        forward_Signer_ComputeInputScript_0 = runtime.ForwardResponseMessage
959

960
        forward_Signer_SignMessage_0 = runtime.ForwardResponseMessage
961

962
        forward_Signer_VerifyMessage_0 = runtime.ForwardResponseMessage
963

964
        forward_Signer_DeriveSharedKey_0 = runtime.ForwardResponseMessage
965

966
        forward_Signer_MuSig2CombineKeys_0 = runtime.ForwardResponseMessage
967

968
        forward_Signer_MuSig2CreateSession_0 = runtime.ForwardResponseMessage
969

970
        forward_Signer_MuSig2RegisterNonces_0 = runtime.ForwardResponseMessage
971

972
        forward_Signer_MuSig2Sign_0 = runtime.ForwardResponseMessage
973

974
        forward_Signer_MuSig2CombineSig_0 = runtime.ForwardResponseMessage
975

976
        forward_Signer_MuSig2Cleanup_0 = runtime.ForwardResponseMessage
977
)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc