You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1887 lines
77 KiB
1887 lines
77 KiB
// Code generated by protoc-gen-go-grpc. DO NOT EDIT. |
|
// versions: |
|
// - protoc-gen-go-grpc v1.6.0 |
|
// - protoc (unknown) |
|
// source: orlyacl/v1/acl.proto |
|
|
|
package orlyaclv1 |
|
|
|
import ( |
|
context "context" |
|
grpc "google.golang.org/grpc" |
|
codes "google.golang.org/grpc/codes" |
|
status "google.golang.org/grpc/status" |
|
) |
|
|
|
// This is a compile-time assertion to ensure that this generated file |
|
// is compatible with the grpc package it is being compiled against. |
|
// Requires gRPC-Go v1.64.0 or later. |
|
const _ = grpc.SupportPackageIsVersion9 |
|
|
|
const ( |
|
ACLService_GetAccessLevel_FullMethodName = "/orlyacl.v1.ACLService/GetAccessLevel" |
|
ACLService_CheckPolicy_FullMethodName = "/orlyacl.v1.ACLService/CheckPolicy" |
|
ACLService_GetACLInfo_FullMethodName = "/orlyacl.v1.ACLService/GetACLInfo" |
|
ACLService_GetMode_FullMethodName = "/orlyacl.v1.ACLService/GetMode" |
|
ACLService_Ready_FullMethodName = "/orlyacl.v1.ACLService/Ready" |
|
ACLService_GetThrottleDelay_FullMethodName = "/orlyacl.v1.ACLService/GetThrottleDelay" |
|
ACLService_AddFollow_FullMethodName = "/orlyacl.v1.ACLService/AddFollow" |
|
ACLService_GetFollowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/GetFollowedPubkeys" |
|
ACLService_GetAdminRelays_FullMethodName = "/orlyacl.v1.ACLService/GetAdminRelays" |
|
ACLService_BanPubkey_FullMethodName = "/orlyacl.v1.ACLService/BanPubkey" |
|
ACLService_UnbanPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnbanPubkey" |
|
ACLService_ListBannedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBannedPubkeys" |
|
ACLService_AllowPubkey_FullMethodName = "/orlyacl.v1.ACLService/AllowPubkey" |
|
ACLService_DisallowPubkey_FullMethodName = "/orlyacl.v1.ACLService/DisallowPubkey" |
|
ACLService_ListAllowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedPubkeys" |
|
ACLService_BanEvent_FullMethodName = "/orlyacl.v1.ACLService/BanEvent" |
|
ACLService_UnbanEvent_FullMethodName = "/orlyacl.v1.ACLService/UnbanEvent" |
|
ACLService_ListBannedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListBannedEvents" |
|
ACLService_AllowEvent_FullMethodName = "/orlyacl.v1.ACLService/AllowEvent" |
|
ACLService_DisallowEvent_FullMethodName = "/orlyacl.v1.ACLService/DisallowEvent" |
|
ACLService_ListAllowedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedEvents" |
|
ACLService_BlockIP_FullMethodName = "/orlyacl.v1.ACLService/BlockIP" |
|
ACLService_UnblockIP_FullMethodName = "/orlyacl.v1.ACLService/UnblockIP" |
|
ACLService_ListBlockedIPs_FullMethodName = "/orlyacl.v1.ACLService/ListBlockedIPs" |
|
ACLService_AllowKind_FullMethodName = "/orlyacl.v1.ACLService/AllowKind" |
|
ACLService_DisallowKind_FullMethodName = "/orlyacl.v1.ACLService/DisallowKind" |
|
ACLService_ListAllowedKinds_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedKinds" |
|
ACLService_UpdatePeerAdmins_FullMethodName = "/orlyacl.v1.ACLService/UpdatePeerAdmins" |
|
ACLService_TrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/TrustPubkey" |
|
ACLService_UntrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/UntrustPubkey" |
|
ACLService_ListTrustedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListTrustedPubkeys" |
|
ACLService_BlacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/BlacklistPubkey" |
|
ACLService_UnblacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnblacklistPubkey" |
|
ACLService_ListBlacklistedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBlacklistedPubkeys" |
|
ACLService_MarkSpam_FullMethodName = "/orlyacl.v1.ACLService/MarkSpam" |
|
ACLService_UnmarkSpam_FullMethodName = "/orlyacl.v1.ACLService/UnmarkSpam" |
|
ACLService_ListSpamEvents_FullMethodName = "/orlyacl.v1.ACLService/ListSpamEvents" |
|
ACLService_RateLimitCheck_FullMethodName = "/orlyacl.v1.ACLService/RateLimitCheck" |
|
ACLService_ProcessConfigEvent_FullMethodName = "/orlyacl.v1.ACLService/ProcessConfigEvent" |
|
ACLService_GetCuratingConfig_FullMethodName = "/orlyacl.v1.ACLService/GetCuratingConfig" |
|
ACLService_IsCuratingConfigured_FullMethodName = "/orlyacl.v1.ACLService/IsCuratingConfigured" |
|
ACLService_ListUnclassifiedUsers_FullMethodName = "/orlyacl.v1.ACLService/ListUnclassifiedUsers" |
|
ACLService_GetEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/GetEventsForPubkey" |
|
ACLService_DeleteEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/DeleteEventsForPubkey" |
|
ACLService_ScanAllPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ScanAllPubkeys" |
|
) |
|
|
|
// ACLServiceClient is the client API for ACLService service. |
|
// |
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream. |
|
// |
|
// ACLService provides access control operations for the Nostr relay |
|
type ACLServiceClient interface { |
|
// GetAccessLevel returns the access level for a pubkey from an IP address |
|
GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error) |
|
// CheckPolicy checks if an event passes policy checks |
|
CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error) |
|
// GetACLInfo returns information about the active ACL mode |
|
GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error) |
|
// GetMode returns the current ACL mode (none/follows/managed/curating) |
|
GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error) |
|
// Ready checks if the ACL service is ready |
|
Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error) |
|
// GetThrottleDelay returns the progressive throttle delay for a pubkey |
|
GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error) |
|
// AddFollow adds a pubkey to the followed list |
|
AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// GetFollowedPubkeys returns all followed pubkeys |
|
GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error) |
|
// GetAdminRelays returns the relay URLs from admin kind 10002 events |
|
GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error) |
|
// BanPubkey adds a pubkey to the ban list |
|
BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UnbanPubkey removes a pubkey from the ban list |
|
UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListBannedPubkeys returns all banned pubkeys |
|
ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error) |
|
// AllowPubkey adds a pubkey to the allow list |
|
AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// DisallowPubkey removes a pubkey from the allow list |
|
DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListAllowedPubkeys returns all explicitly allowed pubkeys |
|
ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error) |
|
// BanEvent adds an event to the ban list |
|
BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UnbanEvent removes an event from the ban list |
|
UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListBannedEvents returns all banned events |
|
ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error) |
|
// AllowEvent adds an event to the allow list |
|
AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// DisallowEvent removes an event from the allow list |
|
DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListAllowedEvents returns all explicitly allowed events |
|
ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error) |
|
// BlockIP adds an IP to the block list |
|
BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UnblockIP removes an IP from the block list |
|
UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListBlockedIPs returns all blocked IPs |
|
ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error) |
|
// AllowKind adds a kind to the allow list |
|
AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// DisallowKind removes a kind from the allow list |
|
DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListAllowedKinds returns all allowed kinds |
|
ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error) |
|
// UpdatePeerAdmins updates the peer relay identity pubkeys |
|
UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// TrustPubkey adds a pubkey to the trusted list |
|
TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UntrustPubkey removes a pubkey from the trusted list |
|
UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListTrustedPubkeys returns all trusted pubkeys |
|
ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error) |
|
// BlacklistPubkey adds a pubkey to the blacklist |
|
BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UnblacklistPubkey removes a pubkey from the blacklist |
|
UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListBlacklistedPubkeys returns all blacklisted pubkeys |
|
ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error) |
|
// MarkSpam marks an event as spam |
|
MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// UnmarkSpam removes the spam flag from an event |
|
UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// ListSpamEvents returns all spam-flagged events |
|
ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error) |
|
// RateLimitCheck checks if a pubkey/IP can publish (rate limiting) |
|
RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error) |
|
// ProcessConfigEvent processes a curating config event (kind 30078) |
|
ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error) |
|
// GetCuratingConfig returns the current curating configuration |
|
GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error) |
|
// IsCuratingConfigured checks if curating mode is configured |
|
IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error) |
|
// ListUnclassifiedUsers returns users who are not trusted or blacklisted |
|
ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error) |
|
// GetEventsForPubkey returns events for a specific pubkey |
|
GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error) |
|
// DeleteEventsForPubkey deletes all events for a pubkey |
|
DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error) |
|
// ScanAllPubkeys scans and indexes all pubkeys in the database |
|
ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error) |
|
} |
|
|
|
type aCLServiceClient struct { |
|
cc grpc.ClientConnInterface |
|
} |
|
|
|
func NewACLServiceClient(cc grpc.ClientConnInterface) ACLServiceClient { |
|
return &aCLServiceClient{cc} |
|
} |
|
|
|
func (c *aCLServiceClient) GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(AccessLevelResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetAccessLevel_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(PolicyCheckResponse) |
|
err := c.cc.Invoke(ctx, ACLService_CheckPolicy_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ACLInfoResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetACLInfo_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ModeResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetMode_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ReadyResponse) |
|
err := c.cc.Invoke(ctx, ACLService_Ready_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ThrottleDelayResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetThrottleDelay_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_AddFollow_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(FollowedPubkeysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetFollowedPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(AdminRelaysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetAdminRelays_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_BanPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UnbanPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListBannedPubkeysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListBannedPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_AllowPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_DisallowPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListAllowedPubkeysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListAllowedPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_BanEvent_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UnbanEvent_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListBannedEventsResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListBannedEvents_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_AllowEvent_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_DisallowEvent_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListAllowedEventsResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListAllowedEvents_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_BlockIP_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UnblockIP_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListBlockedIPsResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListBlockedIPs_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_AllowKind_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_DisallowKind_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListAllowedKindsResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListAllowedKinds_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UpdatePeerAdmins_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_TrustPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UntrustPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListTrustedPubkeysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListTrustedPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_BlacklistPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UnblacklistPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListBlacklistedPubkeysResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListBlacklistedPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_MarkSpam_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_UnmarkSpam_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListSpamEventsResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListSpamEvents_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(RateLimitCheckResponse) |
|
err := c.cc.Invoke(ctx, ACLService_RateLimitCheck_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(Empty) |
|
err := c.cc.Invoke(ctx, ACLService_ProcessConfigEvent_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(CuratingConfig) |
|
err := c.cc.Invoke(ctx, ACLService_GetCuratingConfig_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(BoolResponse) |
|
err := c.cc.Invoke(ctx, ACLService_IsCuratingConfigured_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ListUnclassifiedUsersResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ListUnclassifiedUsers_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(EventsForPubkeyResponse) |
|
err := c.cc.Invoke(ctx, ACLService_GetEventsForPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(DeleteCountResponse) |
|
err := c.cc.Invoke(ctx, ACLService_DeleteEventsForPubkey_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
func (c *aCLServiceClient) ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error) { |
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) |
|
out := new(ScanResultResponse) |
|
err := c.cc.Invoke(ctx, ACLService_ScanAllPubkeys_FullMethodName, in, out, cOpts...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return out, nil |
|
} |
|
|
|
// ACLServiceServer is the server API for ACLService service. |
|
// All implementations must embed UnimplementedACLServiceServer |
|
// for forward compatibility. |
|
// |
|
// ACLService provides access control operations for the Nostr relay |
|
type ACLServiceServer interface { |
|
// GetAccessLevel returns the access level for a pubkey from an IP address |
|
GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error) |
|
// CheckPolicy checks if an event passes policy checks |
|
CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error) |
|
// GetACLInfo returns information about the active ACL mode |
|
GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error) |
|
// GetMode returns the current ACL mode (none/follows/managed/curating) |
|
GetMode(context.Context, *Empty) (*ModeResponse, error) |
|
// Ready checks if the ACL service is ready |
|
Ready(context.Context, *Empty) (*ReadyResponse, error) |
|
// GetThrottleDelay returns the progressive throttle delay for a pubkey |
|
GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error) |
|
// AddFollow adds a pubkey to the followed list |
|
AddFollow(context.Context, *AddFollowRequest) (*Empty, error) |
|
// GetFollowedPubkeys returns all followed pubkeys |
|
GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error) |
|
// GetAdminRelays returns the relay URLs from admin kind 10002 events |
|
GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error) |
|
// BanPubkey adds a pubkey to the ban list |
|
BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error) |
|
// UnbanPubkey removes a pubkey from the ban list |
|
UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error) |
|
// ListBannedPubkeys returns all banned pubkeys |
|
ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error) |
|
// AllowPubkey adds a pubkey to the allow list |
|
AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error) |
|
// DisallowPubkey removes a pubkey from the allow list |
|
DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error) |
|
// ListAllowedPubkeys returns all explicitly allowed pubkeys |
|
ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error) |
|
// BanEvent adds an event to the ban list |
|
BanEvent(context.Context, *BanEventRequest) (*Empty, error) |
|
// UnbanEvent removes an event from the ban list |
|
UnbanEvent(context.Context, *EventRequest) (*Empty, error) |
|
// ListBannedEvents returns all banned events |
|
ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error) |
|
// AllowEvent adds an event to the allow list |
|
AllowEvent(context.Context, *BanEventRequest) (*Empty, error) |
|
// DisallowEvent removes an event from the allow list |
|
DisallowEvent(context.Context, *EventRequest) (*Empty, error) |
|
// ListAllowedEvents returns all explicitly allowed events |
|
ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error) |
|
// BlockIP adds an IP to the block list |
|
BlockIP(context.Context, *BlockIPRequest) (*Empty, error) |
|
// UnblockIP removes an IP from the block list |
|
UnblockIP(context.Context, *IPRequest) (*Empty, error) |
|
// ListBlockedIPs returns all blocked IPs |
|
ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error) |
|
// AllowKind adds a kind to the allow list |
|
AllowKind(context.Context, *AllowKindRequest) (*Empty, error) |
|
// DisallowKind removes a kind from the allow list |
|
DisallowKind(context.Context, *KindRequest) (*Empty, error) |
|
// ListAllowedKinds returns all allowed kinds |
|
ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error) |
|
// UpdatePeerAdmins updates the peer relay identity pubkeys |
|
UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error) |
|
// TrustPubkey adds a pubkey to the trusted list |
|
TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error) |
|
// UntrustPubkey removes a pubkey from the trusted list |
|
UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error) |
|
// ListTrustedPubkeys returns all trusted pubkeys |
|
ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error) |
|
// BlacklistPubkey adds a pubkey to the blacklist |
|
BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error) |
|
// UnblacklistPubkey removes a pubkey from the blacklist |
|
UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error) |
|
// ListBlacklistedPubkeys returns all blacklisted pubkeys |
|
ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error) |
|
// MarkSpam marks an event as spam |
|
MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error) |
|
// UnmarkSpam removes the spam flag from an event |
|
UnmarkSpam(context.Context, *EventRequest) (*Empty, error) |
|
// ListSpamEvents returns all spam-flagged events |
|
ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error) |
|
// RateLimitCheck checks if a pubkey/IP can publish (rate limiting) |
|
RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error) |
|
// ProcessConfigEvent processes a curating config event (kind 30078) |
|
ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error) |
|
// GetCuratingConfig returns the current curating configuration |
|
GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error) |
|
// IsCuratingConfigured checks if curating mode is configured |
|
IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error) |
|
// ListUnclassifiedUsers returns users who are not trusted or blacklisted |
|
ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error) |
|
// GetEventsForPubkey returns events for a specific pubkey |
|
GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error) |
|
// DeleteEventsForPubkey deletes all events for a pubkey |
|
DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error) |
|
// ScanAllPubkeys scans and indexes all pubkeys in the database |
|
ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error) |
|
mustEmbedUnimplementedACLServiceServer() |
|
} |
|
|
|
// UnimplementedACLServiceServer must be embedded to have |
|
// forward compatible implementations. |
|
// |
|
// NOTE: this should be embedded by value instead of pointer to avoid a nil |
|
// pointer dereference when methods are called. |
|
type UnimplementedACLServiceServer struct{} |
|
|
|
func (UnimplementedACLServiceServer) GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetAccessLevel not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method CheckPolicy not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetACLInfo not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetMode(context.Context, *Empty) (*ModeResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetMode not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) Ready(context.Context, *Empty) (*ReadyResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method Ready not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetThrottleDelay not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) AddFollow(context.Context, *AddFollowRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method AddFollow not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetFollowedPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetAdminRelays not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method BanPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UnbanPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListBannedPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method AllowPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method DisallowPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListAllowedPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) BanEvent(context.Context, *BanEventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method BanEvent not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UnbanEvent(context.Context, *EventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UnbanEvent not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListBannedEvents not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) AllowEvent(context.Context, *BanEventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method AllowEvent not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) DisallowEvent(context.Context, *EventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method DisallowEvent not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListAllowedEvents not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) BlockIP(context.Context, *BlockIPRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method BlockIP not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UnblockIP(context.Context, *IPRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UnblockIP not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListBlockedIPs not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) AllowKind(context.Context, *AllowKindRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method AllowKind not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) DisallowKind(context.Context, *KindRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method DisallowKind not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListAllowedKinds not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UpdatePeerAdmins not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method TrustPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UntrustPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListTrustedPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method BlacklistPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UnblacklistPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListBlacklistedPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method MarkSpam not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) UnmarkSpam(context.Context, *EventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method UnmarkSpam not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListSpamEvents not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method RateLimitCheck not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ProcessConfigEvent not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetCuratingConfig not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method IsCuratingConfigured not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ListUnclassifiedUsers not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method GetEventsForPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method DeleteEventsForPubkey not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error) { |
|
return nil, status.Error(codes.Unimplemented, "method ScanAllPubkeys not implemented") |
|
} |
|
func (UnimplementedACLServiceServer) mustEmbedUnimplementedACLServiceServer() {} |
|
func (UnimplementedACLServiceServer) testEmbeddedByValue() {} |
|
|
|
// UnsafeACLServiceServer may be embedded to opt out of forward compatibility for this service. |
|
// Use of this interface is not recommended, as added methods to ACLServiceServer will |
|
// result in compilation errors. |
|
type UnsafeACLServiceServer interface { |
|
mustEmbedUnimplementedACLServiceServer() |
|
} |
|
|
|
func RegisterACLServiceServer(s grpc.ServiceRegistrar, srv ACLServiceServer) { |
|
// If the following call panics, it indicates UnimplementedACLServiceServer was |
|
// embedded by pointer and is nil. This will cause panics if an |
|
// unimplemented method is ever invoked, so we test this at initialization |
|
// time to prevent it from happening at runtime later due to I/O. |
|
if t, ok := srv.(interface{ testEmbeddedByValue() }); ok { |
|
t.testEmbeddedByValue() |
|
} |
|
s.RegisterService(&ACLService_ServiceDesc, srv) |
|
} |
|
|
|
func _ACLService_GetAccessLevel_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(AccessLevelRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetAccessLevel(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetAccessLevel_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetAccessLevel(ctx, req.(*AccessLevelRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_CheckPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PolicyCheckRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).CheckPolicy(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_CheckPolicy_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).CheckPolicy(ctx, req.(*PolicyCheckRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetACLInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetACLInfo(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetACLInfo_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetACLInfo(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetMode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetMode(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetMode_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetMode(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).Ready(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_Ready_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).Ready(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetThrottleDelay_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(ThrottleDelayRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetThrottleDelay(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetThrottleDelay_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetThrottleDelay(ctx, req.(*ThrottleDelayRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_AddFollow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(AddFollowRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).AddFollow(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_AddFollow_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).AddFollow(ctx, req.(*AddFollowRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetFollowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetFollowedPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetAdminRelays_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetAdminRelays(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetAdminRelays_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetAdminRelays(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_BanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(BanPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).BanPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_BanPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).BanPubkey(ctx, req.(*BanPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UnbanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UnbanPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UnbanPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UnbanPubkey(ctx, req.(*PubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListBannedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListBannedPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListBannedPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListBannedPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_AllowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(AllowPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).AllowPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_AllowPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).AllowPubkey(ctx, req.(*AllowPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_DisallowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).DisallowPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_DisallowPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).DisallowPubkey(ctx, req.(*PubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListAllowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListAllowedPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_BanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(BanEventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).BanEvent(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_BanEvent_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).BanEvent(ctx, req.(*BanEventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UnbanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(EventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UnbanEvent(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UnbanEvent_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UnbanEvent(ctx, req.(*EventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListBannedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListBannedEvents(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListBannedEvents_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListBannedEvents(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_AllowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(BanEventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).AllowEvent(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_AllowEvent_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).AllowEvent(ctx, req.(*BanEventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_DisallowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(EventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).DisallowEvent(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_DisallowEvent_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).DisallowEvent(ctx, req.(*EventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListAllowedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListAllowedEvents(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListAllowedEvents_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListAllowedEvents(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_BlockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(BlockIPRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).BlockIP(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_BlockIP_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).BlockIP(ctx, req.(*BlockIPRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UnblockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(IPRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UnblockIP(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UnblockIP_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UnblockIP(ctx, req.(*IPRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListBlockedIPs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListBlockedIPs(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListBlockedIPs_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListBlockedIPs(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_AllowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(AllowKindRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).AllowKind(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_AllowKind_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).AllowKind(ctx, req.(*AllowKindRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_DisallowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(KindRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).DisallowKind(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_DisallowKind_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).DisallowKind(ctx, req.(*KindRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListAllowedKinds_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListAllowedKinds(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListAllowedKinds_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListAllowedKinds(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UpdatePeerAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(UpdatePeerAdminsRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UpdatePeerAdmins_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, req.(*UpdatePeerAdminsRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_TrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(TrustPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).TrustPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_TrustPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).TrustPubkey(ctx, req.(*TrustPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UntrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UntrustPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UntrustPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UntrustPubkey(ctx, req.(*PubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListTrustedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListTrustedPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_BlacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(BlacklistPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).BlacklistPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_BlacklistPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).BlacklistPubkey(ctx, req.(*BlacklistPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UnblacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UnblacklistPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UnblacklistPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UnblacklistPubkey(ctx, req.(*PubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListBlacklistedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListBlacklistedPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_MarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(MarkSpamRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).MarkSpam(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_MarkSpam_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).MarkSpam(ctx, req.(*MarkSpamRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_UnmarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(EventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).UnmarkSpam(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_UnmarkSpam_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).UnmarkSpam(ctx, req.(*EventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListSpamEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListSpamEvents(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListSpamEvents_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListSpamEvents(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_RateLimitCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(RateLimitCheckRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).RateLimitCheck(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_RateLimitCheck_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).RateLimitCheck(ctx, req.(*RateLimitCheckRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ProcessConfigEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(ConfigEventRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ProcessConfigEvent(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ProcessConfigEvent_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ProcessConfigEvent(ctx, req.(*ConfigEventRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetCuratingConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetCuratingConfig(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetCuratingConfig_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetCuratingConfig(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_IsCuratingConfigured_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).IsCuratingConfigured(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_IsCuratingConfigured_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).IsCuratingConfigured(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ListUnclassifiedUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(PaginationRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ListUnclassifiedUsers_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, req.(*PaginationRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_GetEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(GetEventsForPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).GetEventsForPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_GetEventsForPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).GetEventsForPubkey(ctx, req.(*GetEventsForPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_DeleteEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(DeleteEventsForPubkeyRequest) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_DeleteEventsForPubkey_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, req.(*DeleteEventsForPubkeyRequest)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
func _ACLService_ScanAllPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
|
in := new(Empty) |
|
if err := dec(in); err != nil { |
|
return nil, err |
|
} |
|
if interceptor == nil { |
|
return srv.(ACLServiceServer).ScanAllPubkeys(ctx, in) |
|
} |
|
info := &grpc.UnaryServerInfo{ |
|
Server: srv, |
|
FullMethod: ACLService_ScanAllPubkeys_FullMethodName, |
|
} |
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
|
return srv.(ACLServiceServer).ScanAllPubkeys(ctx, req.(*Empty)) |
|
} |
|
return interceptor(ctx, in, info, handler) |
|
} |
|
|
|
// ACLService_ServiceDesc is the grpc.ServiceDesc for ACLService service. |
|
// It's only intended for direct use with grpc.RegisterService, |
|
// and not to be introspected or modified (even as a copy) |
|
var ACLService_ServiceDesc = grpc.ServiceDesc{ |
|
ServiceName: "orlyacl.v1.ACLService", |
|
HandlerType: (*ACLServiceServer)(nil), |
|
Methods: []grpc.MethodDesc{ |
|
{ |
|
MethodName: "GetAccessLevel", |
|
Handler: _ACLService_GetAccessLevel_Handler, |
|
}, |
|
{ |
|
MethodName: "CheckPolicy", |
|
Handler: _ACLService_CheckPolicy_Handler, |
|
}, |
|
{ |
|
MethodName: "GetACLInfo", |
|
Handler: _ACLService_GetACLInfo_Handler, |
|
}, |
|
{ |
|
MethodName: "GetMode", |
|
Handler: _ACLService_GetMode_Handler, |
|
}, |
|
{ |
|
MethodName: "Ready", |
|
Handler: _ACLService_Ready_Handler, |
|
}, |
|
{ |
|
MethodName: "GetThrottleDelay", |
|
Handler: _ACLService_GetThrottleDelay_Handler, |
|
}, |
|
{ |
|
MethodName: "AddFollow", |
|
Handler: _ACLService_AddFollow_Handler, |
|
}, |
|
{ |
|
MethodName: "GetFollowedPubkeys", |
|
Handler: _ACLService_GetFollowedPubkeys_Handler, |
|
}, |
|
{ |
|
MethodName: "GetAdminRelays", |
|
Handler: _ACLService_GetAdminRelays_Handler, |
|
}, |
|
{ |
|
MethodName: "BanPubkey", |
|
Handler: _ACLService_BanPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "UnbanPubkey", |
|
Handler: _ACLService_UnbanPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "ListBannedPubkeys", |
|
Handler: _ACLService_ListBannedPubkeys_Handler, |
|
}, |
|
{ |
|
MethodName: "AllowPubkey", |
|
Handler: _ACLService_AllowPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "DisallowPubkey", |
|
Handler: _ACLService_DisallowPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "ListAllowedPubkeys", |
|
Handler: _ACLService_ListAllowedPubkeys_Handler, |
|
}, |
|
{ |
|
MethodName: "BanEvent", |
|
Handler: _ACLService_BanEvent_Handler, |
|
}, |
|
{ |
|
MethodName: "UnbanEvent", |
|
Handler: _ACLService_UnbanEvent_Handler, |
|
}, |
|
{ |
|
MethodName: "ListBannedEvents", |
|
Handler: _ACLService_ListBannedEvents_Handler, |
|
}, |
|
{ |
|
MethodName: "AllowEvent", |
|
Handler: _ACLService_AllowEvent_Handler, |
|
}, |
|
{ |
|
MethodName: "DisallowEvent", |
|
Handler: _ACLService_DisallowEvent_Handler, |
|
}, |
|
{ |
|
MethodName: "ListAllowedEvents", |
|
Handler: _ACLService_ListAllowedEvents_Handler, |
|
}, |
|
{ |
|
MethodName: "BlockIP", |
|
Handler: _ACLService_BlockIP_Handler, |
|
}, |
|
{ |
|
MethodName: "UnblockIP", |
|
Handler: _ACLService_UnblockIP_Handler, |
|
}, |
|
{ |
|
MethodName: "ListBlockedIPs", |
|
Handler: _ACLService_ListBlockedIPs_Handler, |
|
}, |
|
{ |
|
MethodName: "AllowKind", |
|
Handler: _ACLService_AllowKind_Handler, |
|
}, |
|
{ |
|
MethodName: "DisallowKind", |
|
Handler: _ACLService_DisallowKind_Handler, |
|
}, |
|
{ |
|
MethodName: "ListAllowedKinds", |
|
Handler: _ACLService_ListAllowedKinds_Handler, |
|
}, |
|
{ |
|
MethodName: "UpdatePeerAdmins", |
|
Handler: _ACLService_UpdatePeerAdmins_Handler, |
|
}, |
|
{ |
|
MethodName: "TrustPubkey", |
|
Handler: _ACLService_TrustPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "UntrustPubkey", |
|
Handler: _ACLService_UntrustPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "ListTrustedPubkeys", |
|
Handler: _ACLService_ListTrustedPubkeys_Handler, |
|
}, |
|
{ |
|
MethodName: "BlacklistPubkey", |
|
Handler: _ACLService_BlacklistPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "UnblacklistPubkey", |
|
Handler: _ACLService_UnblacklistPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "ListBlacklistedPubkeys", |
|
Handler: _ACLService_ListBlacklistedPubkeys_Handler, |
|
}, |
|
{ |
|
MethodName: "MarkSpam", |
|
Handler: _ACLService_MarkSpam_Handler, |
|
}, |
|
{ |
|
MethodName: "UnmarkSpam", |
|
Handler: _ACLService_UnmarkSpam_Handler, |
|
}, |
|
{ |
|
MethodName: "ListSpamEvents", |
|
Handler: _ACLService_ListSpamEvents_Handler, |
|
}, |
|
{ |
|
MethodName: "RateLimitCheck", |
|
Handler: _ACLService_RateLimitCheck_Handler, |
|
}, |
|
{ |
|
MethodName: "ProcessConfigEvent", |
|
Handler: _ACLService_ProcessConfigEvent_Handler, |
|
}, |
|
{ |
|
MethodName: "GetCuratingConfig", |
|
Handler: _ACLService_GetCuratingConfig_Handler, |
|
}, |
|
{ |
|
MethodName: "IsCuratingConfigured", |
|
Handler: _ACLService_IsCuratingConfigured_Handler, |
|
}, |
|
{ |
|
MethodName: "ListUnclassifiedUsers", |
|
Handler: _ACLService_ListUnclassifiedUsers_Handler, |
|
}, |
|
{ |
|
MethodName: "GetEventsForPubkey", |
|
Handler: _ACLService_GetEventsForPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "DeleteEventsForPubkey", |
|
Handler: _ACLService_DeleteEventsForPubkey_Handler, |
|
}, |
|
{ |
|
MethodName: "ScanAllPubkeys", |
|
Handler: _ACLService_ScanAllPubkeys_Handler, |
|
}, |
|
}, |
|
Streams: []grpc.StreamDesc{}, |
|
Metadata: "orlyacl/v1/acl.proto", |
|
}
|
|
|