You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1887 lines
77 KiB

// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
// versions:
// - protoc-gen-go-grpc v1.6.0
// - protoc (unknown)
// source: orlyacl/v1/acl.proto
package orlyaclv1
import (
context "context"
grpc "google.golang.org/grpc"
codes "google.golang.org/grpc/codes"
status "google.golang.org/grpc/status"
)
// This is a compile-time assertion to ensure that this generated file
// is compatible with the grpc package it is being compiled against.
// Requires gRPC-Go v1.64.0 or later.
const _ = grpc.SupportPackageIsVersion9
const (
ACLService_GetAccessLevel_FullMethodName = "/orlyacl.v1.ACLService/GetAccessLevel"
ACLService_CheckPolicy_FullMethodName = "/orlyacl.v1.ACLService/CheckPolicy"
ACLService_GetACLInfo_FullMethodName = "/orlyacl.v1.ACLService/GetACLInfo"
ACLService_GetMode_FullMethodName = "/orlyacl.v1.ACLService/GetMode"
ACLService_Ready_FullMethodName = "/orlyacl.v1.ACLService/Ready"
ACLService_GetThrottleDelay_FullMethodName = "/orlyacl.v1.ACLService/GetThrottleDelay"
ACLService_AddFollow_FullMethodName = "/orlyacl.v1.ACLService/AddFollow"
ACLService_GetFollowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/GetFollowedPubkeys"
ACLService_GetAdminRelays_FullMethodName = "/orlyacl.v1.ACLService/GetAdminRelays"
ACLService_BanPubkey_FullMethodName = "/orlyacl.v1.ACLService/BanPubkey"
ACLService_UnbanPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnbanPubkey"
ACLService_ListBannedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBannedPubkeys"
ACLService_AllowPubkey_FullMethodName = "/orlyacl.v1.ACLService/AllowPubkey"
ACLService_DisallowPubkey_FullMethodName = "/orlyacl.v1.ACLService/DisallowPubkey"
ACLService_ListAllowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedPubkeys"
ACLService_BanEvent_FullMethodName = "/orlyacl.v1.ACLService/BanEvent"
ACLService_UnbanEvent_FullMethodName = "/orlyacl.v1.ACLService/UnbanEvent"
ACLService_ListBannedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListBannedEvents"
ACLService_AllowEvent_FullMethodName = "/orlyacl.v1.ACLService/AllowEvent"
ACLService_DisallowEvent_FullMethodName = "/orlyacl.v1.ACLService/DisallowEvent"
ACLService_ListAllowedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedEvents"
ACLService_BlockIP_FullMethodName = "/orlyacl.v1.ACLService/BlockIP"
ACLService_UnblockIP_FullMethodName = "/orlyacl.v1.ACLService/UnblockIP"
ACLService_ListBlockedIPs_FullMethodName = "/orlyacl.v1.ACLService/ListBlockedIPs"
ACLService_AllowKind_FullMethodName = "/orlyacl.v1.ACLService/AllowKind"
ACLService_DisallowKind_FullMethodName = "/orlyacl.v1.ACLService/DisallowKind"
ACLService_ListAllowedKinds_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedKinds"
ACLService_UpdatePeerAdmins_FullMethodName = "/orlyacl.v1.ACLService/UpdatePeerAdmins"
ACLService_TrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/TrustPubkey"
ACLService_UntrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/UntrustPubkey"
ACLService_ListTrustedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListTrustedPubkeys"
ACLService_BlacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/BlacklistPubkey"
ACLService_UnblacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnblacklistPubkey"
ACLService_ListBlacklistedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBlacklistedPubkeys"
ACLService_MarkSpam_FullMethodName = "/orlyacl.v1.ACLService/MarkSpam"
ACLService_UnmarkSpam_FullMethodName = "/orlyacl.v1.ACLService/UnmarkSpam"
ACLService_ListSpamEvents_FullMethodName = "/orlyacl.v1.ACLService/ListSpamEvents"
ACLService_RateLimitCheck_FullMethodName = "/orlyacl.v1.ACLService/RateLimitCheck"
ACLService_ProcessConfigEvent_FullMethodName = "/orlyacl.v1.ACLService/ProcessConfigEvent"
ACLService_GetCuratingConfig_FullMethodName = "/orlyacl.v1.ACLService/GetCuratingConfig"
ACLService_IsCuratingConfigured_FullMethodName = "/orlyacl.v1.ACLService/IsCuratingConfigured"
ACLService_ListUnclassifiedUsers_FullMethodName = "/orlyacl.v1.ACLService/ListUnclassifiedUsers"
ACLService_GetEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/GetEventsForPubkey"
ACLService_DeleteEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/DeleteEventsForPubkey"
ACLService_ScanAllPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ScanAllPubkeys"
)
// ACLServiceClient is the client API for ACLService service.
//
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
//
// ACLService provides access control operations for the Nostr relay
type ACLServiceClient interface {
// GetAccessLevel returns the access level for a pubkey from an IP address
GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error)
// CheckPolicy checks if an event passes policy checks
CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error)
// GetACLInfo returns information about the active ACL mode
GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error)
// GetMode returns the current ACL mode (none/follows/managed/curating)
GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error)
// Ready checks if the ACL service is ready
Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error)
// GetThrottleDelay returns the progressive throttle delay for a pubkey
GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error)
// AddFollow adds a pubkey to the followed list
AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error)
// GetFollowedPubkeys returns all followed pubkeys
GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error)
// GetAdminRelays returns the relay URLs from admin kind 10002 events
GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error)
// BanPubkey adds a pubkey to the ban list
BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// UnbanPubkey removes a pubkey from the ban list
UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// ListBannedPubkeys returns all banned pubkeys
ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error)
// AllowPubkey adds a pubkey to the allow list
AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// DisallowPubkey removes a pubkey from the allow list
DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// ListAllowedPubkeys returns all explicitly allowed pubkeys
ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error)
// BanEvent adds an event to the ban list
BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
// UnbanEvent removes an event from the ban list
UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
// ListBannedEvents returns all banned events
ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error)
// AllowEvent adds an event to the allow list
AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
// DisallowEvent removes an event from the allow list
DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
// ListAllowedEvents returns all explicitly allowed events
ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error)
// BlockIP adds an IP to the block list
BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error)
// UnblockIP removes an IP from the block list
UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error)
// ListBlockedIPs returns all blocked IPs
ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error)
// AllowKind adds a kind to the allow list
AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error)
// DisallowKind removes a kind from the allow list
DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error)
// ListAllowedKinds returns all allowed kinds
ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error)
// UpdatePeerAdmins updates the peer relay identity pubkeys
UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error)
// TrustPubkey adds a pubkey to the trusted list
TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// UntrustPubkey removes a pubkey from the trusted list
UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// ListTrustedPubkeys returns all trusted pubkeys
ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error)
// BlacklistPubkey adds a pubkey to the blacklist
BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// UnblacklistPubkey removes a pubkey from the blacklist
UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
// ListBlacklistedPubkeys returns all blacklisted pubkeys
ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error)
// MarkSpam marks an event as spam
MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error)
// UnmarkSpam removes the spam flag from an event
UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
// ListSpamEvents returns all spam-flagged events
ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error)
// RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error)
// ProcessConfigEvent processes a curating config event (kind 30078)
ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error)
// GetCuratingConfig returns the current curating configuration
GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error)
// IsCuratingConfigured checks if curating mode is configured
IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error)
// ListUnclassifiedUsers returns users who are not trusted or blacklisted
ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error)
// GetEventsForPubkey returns events for a specific pubkey
GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error)
// DeleteEventsForPubkey deletes all events for a pubkey
DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error)
// ScanAllPubkeys scans and indexes all pubkeys in the database
ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error)
}
type aCLServiceClient struct {
cc grpc.ClientConnInterface
}
func NewACLServiceClient(cc grpc.ClientConnInterface) ACLServiceClient {
return &aCLServiceClient{cc}
}
func (c *aCLServiceClient) GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(AccessLevelResponse)
err := c.cc.Invoke(ctx, ACLService_GetAccessLevel_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(PolicyCheckResponse)
err := c.cc.Invoke(ctx, ACLService_CheckPolicy_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ACLInfoResponse)
err := c.cc.Invoke(ctx, ACLService_GetACLInfo_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ModeResponse)
err := c.cc.Invoke(ctx, ACLService_GetMode_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ReadyResponse)
err := c.cc.Invoke(ctx, ACLService_Ready_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ThrottleDelayResponse)
err := c.cc.Invoke(ctx, ACLService_GetThrottleDelay_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_AddFollow_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(FollowedPubkeysResponse)
err := c.cc.Invoke(ctx, ACLService_GetFollowedPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(AdminRelaysResponse)
err := c.cc.Invoke(ctx, ACLService_GetAdminRelays_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_BanPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UnbanPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListBannedPubkeysResponse)
err := c.cc.Invoke(ctx, ACLService_ListBannedPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_AllowPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_DisallowPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListAllowedPubkeysResponse)
err := c.cc.Invoke(ctx, ACLService_ListAllowedPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_BanEvent_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UnbanEvent_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListBannedEventsResponse)
err := c.cc.Invoke(ctx, ACLService_ListBannedEvents_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_AllowEvent_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_DisallowEvent_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListAllowedEventsResponse)
err := c.cc.Invoke(ctx, ACLService_ListAllowedEvents_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_BlockIP_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UnblockIP_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListBlockedIPsResponse)
err := c.cc.Invoke(ctx, ACLService_ListBlockedIPs_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_AllowKind_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_DisallowKind_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListAllowedKindsResponse)
err := c.cc.Invoke(ctx, ACLService_ListAllowedKinds_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UpdatePeerAdmins_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_TrustPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UntrustPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListTrustedPubkeysResponse)
err := c.cc.Invoke(ctx, ACLService_ListTrustedPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_BlacklistPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UnblacklistPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListBlacklistedPubkeysResponse)
err := c.cc.Invoke(ctx, ACLService_ListBlacklistedPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_MarkSpam_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_UnmarkSpam_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListSpamEventsResponse)
err := c.cc.Invoke(ctx, ACLService_ListSpamEvents_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(RateLimitCheckResponse)
err := c.cc.Invoke(ctx, ACLService_RateLimitCheck_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(Empty)
err := c.cc.Invoke(ctx, ACLService_ProcessConfigEvent_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(CuratingConfig)
err := c.cc.Invoke(ctx, ACLService_GetCuratingConfig_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(BoolResponse)
err := c.cc.Invoke(ctx, ACLService_IsCuratingConfigured_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ListUnclassifiedUsersResponse)
err := c.cc.Invoke(ctx, ACLService_ListUnclassifiedUsers_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(EventsForPubkeyResponse)
err := c.cc.Invoke(ctx, ACLService_GetEventsForPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(DeleteCountResponse)
err := c.cc.Invoke(ctx, ACLService_DeleteEventsForPubkey_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *aCLServiceClient) ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error) {
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
out := new(ScanResultResponse)
err := c.cc.Invoke(ctx, ACLService_ScanAllPubkeys_FullMethodName, in, out, cOpts...)
if err != nil {
return nil, err
}
return out, nil
}
// ACLServiceServer is the server API for ACLService service.
// All implementations must embed UnimplementedACLServiceServer
// for forward compatibility.
//
// ACLService provides access control operations for the Nostr relay
type ACLServiceServer interface {
// GetAccessLevel returns the access level for a pubkey from an IP address
GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error)
// CheckPolicy checks if an event passes policy checks
CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error)
// GetACLInfo returns information about the active ACL mode
GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error)
// GetMode returns the current ACL mode (none/follows/managed/curating)
GetMode(context.Context, *Empty) (*ModeResponse, error)
// Ready checks if the ACL service is ready
Ready(context.Context, *Empty) (*ReadyResponse, error)
// GetThrottleDelay returns the progressive throttle delay for a pubkey
GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error)
// AddFollow adds a pubkey to the followed list
AddFollow(context.Context, *AddFollowRequest) (*Empty, error)
// GetFollowedPubkeys returns all followed pubkeys
GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error)
// GetAdminRelays returns the relay URLs from admin kind 10002 events
GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error)
// BanPubkey adds a pubkey to the ban list
BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error)
// UnbanPubkey removes a pubkey from the ban list
UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error)
// ListBannedPubkeys returns all banned pubkeys
ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error)
// AllowPubkey adds a pubkey to the allow list
AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error)
// DisallowPubkey removes a pubkey from the allow list
DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error)
// ListAllowedPubkeys returns all explicitly allowed pubkeys
ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error)
// BanEvent adds an event to the ban list
BanEvent(context.Context, *BanEventRequest) (*Empty, error)
// UnbanEvent removes an event from the ban list
UnbanEvent(context.Context, *EventRequest) (*Empty, error)
// ListBannedEvents returns all banned events
ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error)
// AllowEvent adds an event to the allow list
AllowEvent(context.Context, *BanEventRequest) (*Empty, error)
// DisallowEvent removes an event from the allow list
DisallowEvent(context.Context, *EventRequest) (*Empty, error)
// ListAllowedEvents returns all explicitly allowed events
ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error)
// BlockIP adds an IP to the block list
BlockIP(context.Context, *BlockIPRequest) (*Empty, error)
// UnblockIP removes an IP from the block list
UnblockIP(context.Context, *IPRequest) (*Empty, error)
// ListBlockedIPs returns all blocked IPs
ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error)
// AllowKind adds a kind to the allow list
AllowKind(context.Context, *AllowKindRequest) (*Empty, error)
// DisallowKind removes a kind from the allow list
DisallowKind(context.Context, *KindRequest) (*Empty, error)
// ListAllowedKinds returns all allowed kinds
ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error)
// UpdatePeerAdmins updates the peer relay identity pubkeys
UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error)
// TrustPubkey adds a pubkey to the trusted list
TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error)
// UntrustPubkey removes a pubkey from the trusted list
UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error)
// ListTrustedPubkeys returns all trusted pubkeys
ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error)
// BlacklistPubkey adds a pubkey to the blacklist
BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error)
// UnblacklistPubkey removes a pubkey from the blacklist
UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error)
// ListBlacklistedPubkeys returns all blacklisted pubkeys
ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error)
// MarkSpam marks an event as spam
MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error)
// UnmarkSpam removes the spam flag from an event
UnmarkSpam(context.Context, *EventRequest) (*Empty, error)
// ListSpamEvents returns all spam-flagged events
ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error)
// RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error)
// ProcessConfigEvent processes a curating config event (kind 30078)
ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error)
// GetCuratingConfig returns the current curating configuration
GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error)
// IsCuratingConfigured checks if curating mode is configured
IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error)
// ListUnclassifiedUsers returns users who are not trusted or blacklisted
ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error)
// GetEventsForPubkey returns events for a specific pubkey
GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error)
// DeleteEventsForPubkey deletes all events for a pubkey
DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error)
// ScanAllPubkeys scans and indexes all pubkeys in the database
ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error)
mustEmbedUnimplementedACLServiceServer()
}
// UnimplementedACLServiceServer must be embedded to have
// forward compatible implementations.
//
// NOTE: this should be embedded by value instead of pointer to avoid a nil
// pointer dereference when methods are called.
type UnimplementedACLServiceServer struct{}
func (UnimplementedACLServiceServer) GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetAccessLevel not implemented")
}
func (UnimplementedACLServiceServer) CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error) {
return nil, status.Error(codes.Unimplemented, "method CheckPolicy not implemented")
}
func (UnimplementedACLServiceServer) GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetACLInfo not implemented")
}
func (UnimplementedACLServiceServer) GetMode(context.Context, *Empty) (*ModeResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetMode not implemented")
}
func (UnimplementedACLServiceServer) Ready(context.Context, *Empty) (*ReadyResponse, error) {
return nil, status.Error(codes.Unimplemented, "method Ready not implemented")
}
func (UnimplementedACLServiceServer) GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetThrottleDelay not implemented")
}
func (UnimplementedACLServiceServer) AddFollow(context.Context, *AddFollowRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method AddFollow not implemented")
}
func (UnimplementedACLServiceServer) GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetFollowedPubkeys not implemented")
}
func (UnimplementedACLServiceServer) GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetAdminRelays not implemented")
}
func (UnimplementedACLServiceServer) BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method BanPubkey not implemented")
}
func (UnimplementedACLServiceServer) UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UnbanPubkey not implemented")
}
func (UnimplementedACLServiceServer) ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListBannedPubkeys not implemented")
}
func (UnimplementedACLServiceServer) AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method AllowPubkey not implemented")
}
func (UnimplementedACLServiceServer) DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method DisallowPubkey not implemented")
}
func (UnimplementedACLServiceServer) ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListAllowedPubkeys not implemented")
}
func (UnimplementedACLServiceServer) BanEvent(context.Context, *BanEventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method BanEvent not implemented")
}
func (UnimplementedACLServiceServer) UnbanEvent(context.Context, *EventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UnbanEvent not implemented")
}
func (UnimplementedACLServiceServer) ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListBannedEvents not implemented")
}
func (UnimplementedACLServiceServer) AllowEvent(context.Context, *BanEventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method AllowEvent not implemented")
}
func (UnimplementedACLServiceServer) DisallowEvent(context.Context, *EventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method DisallowEvent not implemented")
}
func (UnimplementedACLServiceServer) ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListAllowedEvents not implemented")
}
func (UnimplementedACLServiceServer) BlockIP(context.Context, *BlockIPRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method BlockIP not implemented")
}
func (UnimplementedACLServiceServer) UnblockIP(context.Context, *IPRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UnblockIP not implemented")
}
func (UnimplementedACLServiceServer) ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListBlockedIPs not implemented")
}
func (UnimplementedACLServiceServer) AllowKind(context.Context, *AllowKindRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method AllowKind not implemented")
}
func (UnimplementedACLServiceServer) DisallowKind(context.Context, *KindRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method DisallowKind not implemented")
}
func (UnimplementedACLServiceServer) ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListAllowedKinds not implemented")
}
func (UnimplementedACLServiceServer) UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UpdatePeerAdmins not implemented")
}
func (UnimplementedACLServiceServer) TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method TrustPubkey not implemented")
}
func (UnimplementedACLServiceServer) UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UntrustPubkey not implemented")
}
func (UnimplementedACLServiceServer) ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListTrustedPubkeys not implemented")
}
func (UnimplementedACLServiceServer) BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method BlacklistPubkey not implemented")
}
func (UnimplementedACLServiceServer) UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UnblacklistPubkey not implemented")
}
func (UnimplementedACLServiceServer) ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListBlacklistedPubkeys not implemented")
}
func (UnimplementedACLServiceServer) MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method MarkSpam not implemented")
}
func (UnimplementedACLServiceServer) UnmarkSpam(context.Context, *EventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method UnmarkSpam not implemented")
}
func (UnimplementedACLServiceServer) ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListSpamEvents not implemented")
}
func (UnimplementedACLServiceServer) RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error) {
return nil, status.Error(codes.Unimplemented, "method RateLimitCheck not implemented")
}
func (UnimplementedACLServiceServer) ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error) {
return nil, status.Error(codes.Unimplemented, "method ProcessConfigEvent not implemented")
}
func (UnimplementedACLServiceServer) GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error) {
return nil, status.Error(codes.Unimplemented, "method GetCuratingConfig not implemented")
}
func (UnimplementedACLServiceServer) IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error) {
return nil, status.Error(codes.Unimplemented, "method IsCuratingConfigured not implemented")
}
func (UnimplementedACLServiceServer) ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ListUnclassifiedUsers not implemented")
}
func (UnimplementedACLServiceServer) GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error) {
return nil, status.Error(codes.Unimplemented, "method GetEventsForPubkey not implemented")
}
func (UnimplementedACLServiceServer) DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error) {
return nil, status.Error(codes.Unimplemented, "method DeleteEventsForPubkey not implemented")
}
func (UnimplementedACLServiceServer) ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error) {
return nil, status.Error(codes.Unimplemented, "method ScanAllPubkeys not implemented")
}
func (UnimplementedACLServiceServer) mustEmbedUnimplementedACLServiceServer() {}
func (UnimplementedACLServiceServer) testEmbeddedByValue() {}
// UnsafeACLServiceServer may be embedded to opt out of forward compatibility for this service.
// Use of this interface is not recommended, as added methods to ACLServiceServer will
// result in compilation errors.
type UnsafeACLServiceServer interface {
mustEmbedUnimplementedACLServiceServer()
}
func RegisterACLServiceServer(s grpc.ServiceRegistrar, srv ACLServiceServer) {
// If the following call panics, it indicates UnimplementedACLServiceServer was
// embedded by pointer and is nil. This will cause panics if an
// unimplemented method is ever invoked, so we test this at initialization
// time to prevent it from happening at runtime later due to I/O.
if t, ok := srv.(interface{ testEmbeddedByValue() }); ok {
t.testEmbeddedByValue()
}
s.RegisterService(&ACLService_ServiceDesc, srv)
}
func _ACLService_GetAccessLevel_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AccessLevelRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetAccessLevel(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetAccessLevel_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetAccessLevel(ctx, req.(*AccessLevelRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_CheckPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PolicyCheckRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).CheckPolicy(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_CheckPolicy_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).CheckPolicy(ctx, req.(*PolicyCheckRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetACLInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetACLInfo(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetACLInfo_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetACLInfo(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetMode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetMode(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetMode_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetMode(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).Ready(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_Ready_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).Ready(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetThrottleDelay_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ThrottleDelayRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetThrottleDelay(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetThrottleDelay_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetThrottleDelay(ctx, req.(*ThrottleDelayRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_AddFollow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AddFollowRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).AddFollow(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_AddFollow_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).AddFollow(ctx, req.(*AddFollowRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetFollowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetFollowedPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetAdminRelays_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetAdminRelays(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetAdminRelays_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetAdminRelays(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_BanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(BanPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).BanPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_BanPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).BanPubkey(ctx, req.(*BanPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UnbanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UnbanPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UnbanPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UnbanPubkey(ctx, req.(*PubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListBannedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListBannedPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListBannedPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListBannedPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_AllowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AllowPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).AllowPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_AllowPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).AllowPubkey(ctx, req.(*AllowPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_DisallowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).DisallowPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_DisallowPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).DisallowPubkey(ctx, req.(*PubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListAllowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListAllowedPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_BanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(BanEventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).BanEvent(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_BanEvent_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).BanEvent(ctx, req.(*BanEventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UnbanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(EventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UnbanEvent(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UnbanEvent_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UnbanEvent(ctx, req.(*EventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListBannedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListBannedEvents(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListBannedEvents_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListBannedEvents(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_AllowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(BanEventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).AllowEvent(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_AllowEvent_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).AllowEvent(ctx, req.(*BanEventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_DisallowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(EventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).DisallowEvent(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_DisallowEvent_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).DisallowEvent(ctx, req.(*EventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListAllowedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListAllowedEvents(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListAllowedEvents_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListAllowedEvents(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_BlockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(BlockIPRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).BlockIP(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_BlockIP_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).BlockIP(ctx, req.(*BlockIPRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UnblockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(IPRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UnblockIP(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UnblockIP_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UnblockIP(ctx, req.(*IPRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListBlockedIPs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListBlockedIPs(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListBlockedIPs_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListBlockedIPs(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_AllowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AllowKindRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).AllowKind(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_AllowKind_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).AllowKind(ctx, req.(*AllowKindRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_DisallowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(KindRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).DisallowKind(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_DisallowKind_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).DisallowKind(ctx, req.(*KindRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListAllowedKinds_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListAllowedKinds(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListAllowedKinds_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListAllowedKinds(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UpdatePeerAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(UpdatePeerAdminsRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UpdatePeerAdmins_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, req.(*UpdatePeerAdminsRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_TrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(TrustPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).TrustPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_TrustPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).TrustPubkey(ctx, req.(*TrustPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UntrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UntrustPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UntrustPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UntrustPubkey(ctx, req.(*PubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListTrustedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListTrustedPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_BlacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(BlacklistPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).BlacklistPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_BlacklistPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).BlacklistPubkey(ctx, req.(*BlacklistPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UnblacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UnblacklistPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UnblacklistPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UnblacklistPubkey(ctx, req.(*PubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListBlacklistedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListBlacklistedPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_MarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(MarkSpamRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).MarkSpam(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_MarkSpam_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).MarkSpam(ctx, req.(*MarkSpamRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_UnmarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(EventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).UnmarkSpam(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_UnmarkSpam_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).UnmarkSpam(ctx, req.(*EventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListSpamEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListSpamEvents(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListSpamEvents_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListSpamEvents(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_RateLimitCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(RateLimitCheckRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).RateLimitCheck(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_RateLimitCheck_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).RateLimitCheck(ctx, req.(*RateLimitCheckRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ProcessConfigEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ConfigEventRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ProcessConfigEvent(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ProcessConfigEvent_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ProcessConfigEvent(ctx, req.(*ConfigEventRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetCuratingConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetCuratingConfig(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetCuratingConfig_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetCuratingConfig(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_IsCuratingConfigured_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).IsCuratingConfigured(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_IsCuratingConfigured_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).IsCuratingConfigured(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ListUnclassifiedUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PaginationRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ListUnclassifiedUsers_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, req.(*PaginationRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_GetEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(GetEventsForPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).GetEventsForPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_GetEventsForPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).GetEventsForPubkey(ctx, req.(*GetEventsForPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_DeleteEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(DeleteEventsForPubkeyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_DeleteEventsForPubkey_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, req.(*DeleteEventsForPubkeyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _ACLService_ScanAllPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(Empty)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(ACLServiceServer).ScanAllPubkeys(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: ACLService_ScanAllPubkeys_FullMethodName,
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(ACLServiceServer).ScanAllPubkeys(ctx, req.(*Empty))
}
return interceptor(ctx, in, info, handler)
}
// ACLService_ServiceDesc is the grpc.ServiceDesc for ACLService service.
// It's only intended for direct use with grpc.RegisterService,
// and not to be introspected or modified (even as a copy)
var ACLService_ServiceDesc = grpc.ServiceDesc{
ServiceName: "orlyacl.v1.ACLService",
HandlerType: (*ACLServiceServer)(nil),
Methods: []grpc.MethodDesc{
{
MethodName: "GetAccessLevel",
Handler: _ACLService_GetAccessLevel_Handler,
},
{
MethodName: "CheckPolicy",
Handler: _ACLService_CheckPolicy_Handler,
},
{
MethodName: "GetACLInfo",
Handler: _ACLService_GetACLInfo_Handler,
},
{
MethodName: "GetMode",
Handler: _ACLService_GetMode_Handler,
},
{
MethodName: "Ready",
Handler: _ACLService_Ready_Handler,
},
{
MethodName: "GetThrottleDelay",
Handler: _ACLService_GetThrottleDelay_Handler,
},
{
MethodName: "AddFollow",
Handler: _ACLService_AddFollow_Handler,
},
{
MethodName: "GetFollowedPubkeys",
Handler: _ACLService_GetFollowedPubkeys_Handler,
},
{
MethodName: "GetAdminRelays",
Handler: _ACLService_GetAdminRelays_Handler,
},
{
MethodName: "BanPubkey",
Handler: _ACLService_BanPubkey_Handler,
},
{
MethodName: "UnbanPubkey",
Handler: _ACLService_UnbanPubkey_Handler,
},
{
MethodName: "ListBannedPubkeys",
Handler: _ACLService_ListBannedPubkeys_Handler,
},
{
MethodName: "AllowPubkey",
Handler: _ACLService_AllowPubkey_Handler,
},
{
MethodName: "DisallowPubkey",
Handler: _ACLService_DisallowPubkey_Handler,
},
{
MethodName: "ListAllowedPubkeys",
Handler: _ACLService_ListAllowedPubkeys_Handler,
},
{
MethodName: "BanEvent",
Handler: _ACLService_BanEvent_Handler,
},
{
MethodName: "UnbanEvent",
Handler: _ACLService_UnbanEvent_Handler,
},
{
MethodName: "ListBannedEvents",
Handler: _ACLService_ListBannedEvents_Handler,
},
{
MethodName: "AllowEvent",
Handler: _ACLService_AllowEvent_Handler,
},
{
MethodName: "DisallowEvent",
Handler: _ACLService_DisallowEvent_Handler,
},
{
MethodName: "ListAllowedEvents",
Handler: _ACLService_ListAllowedEvents_Handler,
},
{
MethodName: "BlockIP",
Handler: _ACLService_BlockIP_Handler,
},
{
MethodName: "UnblockIP",
Handler: _ACLService_UnblockIP_Handler,
},
{
MethodName: "ListBlockedIPs",
Handler: _ACLService_ListBlockedIPs_Handler,
},
{
MethodName: "AllowKind",
Handler: _ACLService_AllowKind_Handler,
},
{
MethodName: "DisallowKind",
Handler: _ACLService_DisallowKind_Handler,
},
{
MethodName: "ListAllowedKinds",
Handler: _ACLService_ListAllowedKinds_Handler,
},
{
MethodName: "UpdatePeerAdmins",
Handler: _ACLService_UpdatePeerAdmins_Handler,
},
{
MethodName: "TrustPubkey",
Handler: _ACLService_TrustPubkey_Handler,
},
{
MethodName: "UntrustPubkey",
Handler: _ACLService_UntrustPubkey_Handler,
},
{
MethodName: "ListTrustedPubkeys",
Handler: _ACLService_ListTrustedPubkeys_Handler,
},
{
MethodName: "BlacklistPubkey",
Handler: _ACLService_BlacklistPubkey_Handler,
},
{
MethodName: "UnblacklistPubkey",
Handler: _ACLService_UnblacklistPubkey_Handler,
},
{
MethodName: "ListBlacklistedPubkeys",
Handler: _ACLService_ListBlacklistedPubkeys_Handler,
},
{
MethodName: "MarkSpam",
Handler: _ACLService_MarkSpam_Handler,
},
{
MethodName: "UnmarkSpam",
Handler: _ACLService_UnmarkSpam_Handler,
},
{
MethodName: "ListSpamEvents",
Handler: _ACLService_ListSpamEvents_Handler,
},
{
MethodName: "RateLimitCheck",
Handler: _ACLService_RateLimitCheck_Handler,
},
{
MethodName: "ProcessConfigEvent",
Handler: _ACLService_ProcessConfigEvent_Handler,
},
{
MethodName: "GetCuratingConfig",
Handler: _ACLService_GetCuratingConfig_Handler,
},
{
MethodName: "IsCuratingConfigured",
Handler: _ACLService_IsCuratingConfigured_Handler,
},
{
MethodName: "ListUnclassifiedUsers",
Handler: _ACLService_ListUnclassifiedUsers_Handler,
},
{
MethodName: "GetEventsForPubkey",
Handler: _ACLService_GetEventsForPubkey_Handler,
},
{
MethodName: "DeleteEventsForPubkey",
Handler: _ACLService_DeleteEventsForPubkey_Handler,
},
{
MethodName: "ScanAllPubkeys",
Handler: _ACLService_ScanAllPubkeys_Handler,
},
},
Streams: []grpc.StreamDesc{},
Metadata: "orlyacl/v1/acl.proto",
}