acl_grpc.pb.go raw
1 // Code generated by protoc-gen-go-grpc. DO NOT EDIT.
2 // versions:
3 // - protoc-gen-go-grpc v1.6.0
4 // - protoc (unknown)
5 // source: orlyacl/v1/acl.proto
6
7 package orlyaclv1
8
9 import (
10 context "context"
11 grpc "google.golang.org/grpc"
12 codes "google.golang.org/grpc/codes"
13 status "google.golang.org/grpc/status"
14 )
15
16 // This is a compile-time assertion to ensure that this generated file
17 // is compatible with the grpc package it is being compiled against.
18 // Requires gRPC-Go v1.64.0 or later.
19 const _ = grpc.SupportPackageIsVersion9
20
21 const (
22 ACLService_GetAccessLevel_FullMethodName = "/orlyacl.v1.ACLService/GetAccessLevel"
23 ACLService_CheckPolicy_FullMethodName = "/orlyacl.v1.ACLService/CheckPolicy"
24 ACLService_GetACLInfo_FullMethodName = "/orlyacl.v1.ACLService/GetACLInfo"
25 ACLService_GetMode_FullMethodName = "/orlyacl.v1.ACLService/GetMode"
26 ACLService_Ready_FullMethodName = "/orlyacl.v1.ACLService/Ready"
27 ACLService_GetThrottleDelay_FullMethodName = "/orlyacl.v1.ACLService/GetThrottleDelay"
28 ACLService_AddFollow_FullMethodName = "/orlyacl.v1.ACLService/AddFollow"
29 ACLService_GetFollowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/GetFollowedPubkeys"
30 ACLService_GetAdminRelays_FullMethodName = "/orlyacl.v1.ACLService/GetAdminRelays"
31 ACLService_BanPubkey_FullMethodName = "/orlyacl.v1.ACLService/BanPubkey"
32 ACLService_UnbanPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnbanPubkey"
33 ACLService_ListBannedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBannedPubkeys"
34 ACLService_AllowPubkey_FullMethodName = "/orlyacl.v1.ACLService/AllowPubkey"
35 ACLService_DisallowPubkey_FullMethodName = "/orlyacl.v1.ACLService/DisallowPubkey"
36 ACLService_ListAllowedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedPubkeys"
37 ACLService_BanEvent_FullMethodName = "/orlyacl.v1.ACLService/BanEvent"
38 ACLService_UnbanEvent_FullMethodName = "/orlyacl.v1.ACLService/UnbanEvent"
39 ACLService_ListBannedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListBannedEvents"
40 ACLService_AllowEvent_FullMethodName = "/orlyacl.v1.ACLService/AllowEvent"
41 ACLService_DisallowEvent_FullMethodName = "/orlyacl.v1.ACLService/DisallowEvent"
42 ACLService_ListAllowedEvents_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedEvents"
43 ACLService_BlockIP_FullMethodName = "/orlyacl.v1.ACLService/BlockIP"
44 ACLService_UnblockIP_FullMethodName = "/orlyacl.v1.ACLService/UnblockIP"
45 ACLService_ListBlockedIPs_FullMethodName = "/orlyacl.v1.ACLService/ListBlockedIPs"
46 ACLService_AllowKind_FullMethodName = "/orlyacl.v1.ACLService/AllowKind"
47 ACLService_DisallowKind_FullMethodName = "/orlyacl.v1.ACLService/DisallowKind"
48 ACLService_ListAllowedKinds_FullMethodName = "/orlyacl.v1.ACLService/ListAllowedKinds"
49 ACLService_UpdatePeerAdmins_FullMethodName = "/orlyacl.v1.ACLService/UpdatePeerAdmins"
50 ACLService_TrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/TrustPubkey"
51 ACLService_UntrustPubkey_FullMethodName = "/orlyacl.v1.ACLService/UntrustPubkey"
52 ACLService_ListTrustedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListTrustedPubkeys"
53 ACLService_BlacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/BlacklistPubkey"
54 ACLService_UnblacklistPubkey_FullMethodName = "/orlyacl.v1.ACLService/UnblacklistPubkey"
55 ACLService_ListBlacklistedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBlacklistedPubkeys"
56 ACLService_MarkSpam_FullMethodName = "/orlyacl.v1.ACLService/MarkSpam"
57 ACLService_UnmarkSpam_FullMethodName = "/orlyacl.v1.ACLService/UnmarkSpam"
58 ACLService_ListSpamEvents_FullMethodName = "/orlyacl.v1.ACLService/ListSpamEvents"
59 ACLService_RateLimitCheck_FullMethodName = "/orlyacl.v1.ACLService/RateLimitCheck"
60 ACLService_ProcessConfigEvent_FullMethodName = "/orlyacl.v1.ACLService/ProcessConfigEvent"
61 ACLService_GetCuratingConfig_FullMethodName = "/orlyacl.v1.ACLService/GetCuratingConfig"
62 ACLService_IsCuratingConfigured_FullMethodName = "/orlyacl.v1.ACLService/IsCuratingConfigured"
63 ACLService_ListUnclassifiedUsers_FullMethodName = "/orlyacl.v1.ACLService/ListUnclassifiedUsers"
64 ACLService_GetEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/GetEventsForPubkey"
65 ACLService_DeleteEventsForPubkey_FullMethodName = "/orlyacl.v1.ACLService/DeleteEventsForPubkey"
66 ACLService_ScanAllPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ScanAllPubkeys"
67 ACLService_SubscribePubkey_FullMethodName = "/orlyacl.v1.ACLService/SubscribePubkey"
68 ACLService_UnsubscribePubkey_FullMethodName = "/orlyacl.v1.ACLService/UnsubscribePubkey"
69 ACLService_IsSubscribed_FullMethodName = "/orlyacl.v1.ACLService/IsSubscribed"
70 ACLService_GetSubscription_FullMethodName = "/orlyacl.v1.ACLService/GetSubscription"
71 ACLService_ClaimAlias_FullMethodName = "/orlyacl.v1.ACLService/ClaimAlias"
72 ACLService_GetAliasByPubkey_FullMethodName = "/orlyacl.v1.ACLService/GetAliasByPubkey"
73 ACLService_GetPubkeyByAlias_FullMethodName = "/orlyacl.v1.ACLService/GetPubkeyByAlias"
74 ACLService_IsAliasTaken_FullMethodName = "/orlyacl.v1.ACLService/IsAliasTaken"
75 )
76
77 // ACLServiceClient is the client API for ACLService service.
78 //
79 // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
80 //
81 // ACLService provides access control operations for the Nostr relay
82 type ACLServiceClient interface {
83 // GetAccessLevel returns the access level for a pubkey from an IP address
84 GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error)
85 // CheckPolicy checks if an event passes policy checks
86 CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error)
87 // GetACLInfo returns information about the active ACL mode
88 GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error)
89 // GetMode returns the current ACL mode (none/follows/managed/curating)
90 GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error)
91 // Ready checks if the ACL service is ready
92 Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error)
93 // GetThrottleDelay returns the progressive throttle delay for a pubkey
94 GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error)
95 // AddFollow adds a pubkey to the followed list
96 AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error)
97 // GetFollowedPubkeys returns all followed pubkeys
98 GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error)
99 // GetAdminRelays returns the relay URLs from admin kind 10002 events
100 GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error)
101 // BanPubkey adds a pubkey to the ban list
102 BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
103 // UnbanPubkey removes a pubkey from the ban list
104 UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
105 // ListBannedPubkeys returns all banned pubkeys
106 ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error)
107 // AllowPubkey adds a pubkey to the allow list
108 AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
109 // DisallowPubkey removes a pubkey from the allow list
110 DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
111 // ListAllowedPubkeys returns all explicitly allowed pubkeys
112 ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error)
113 // BanEvent adds an event to the ban list
114 BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
115 // UnbanEvent removes an event from the ban list
116 UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
117 // ListBannedEvents returns all banned events
118 ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error)
119 // AllowEvent adds an event to the allow list
120 AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
121 // DisallowEvent removes an event from the allow list
122 DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
123 // ListAllowedEvents returns all explicitly allowed events
124 ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error)
125 // BlockIP adds an IP to the block list
126 BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error)
127 // UnblockIP removes an IP from the block list
128 UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error)
129 // ListBlockedIPs returns all blocked IPs
130 ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error)
131 // AllowKind adds a kind to the allow list
132 AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error)
133 // DisallowKind removes a kind from the allow list
134 DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error)
135 // ListAllowedKinds returns all allowed kinds
136 ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error)
137 // UpdatePeerAdmins updates the peer relay identity pubkeys
138 UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error)
139 // TrustPubkey adds a pubkey to the trusted list
140 TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
141 // UntrustPubkey removes a pubkey from the trusted list
142 UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
143 // ListTrustedPubkeys returns all trusted pubkeys
144 ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error)
145 // BlacklistPubkey adds a pubkey to the blacklist
146 BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
147 // UnblacklistPubkey removes a pubkey from the blacklist
148 UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
149 // ListBlacklistedPubkeys returns all blacklisted pubkeys
150 ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error)
151 // MarkSpam marks an event as spam
152 MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error)
153 // UnmarkSpam removes the spam flag from an event
154 UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
155 // ListSpamEvents returns all spam-flagged events
156 ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error)
157 // RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
158 RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error)
159 // ProcessConfigEvent processes a curating config event (kind 30078)
160 ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error)
161 // GetCuratingConfig returns the current curating configuration
162 GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error)
163 // IsCuratingConfigured checks if curating mode is configured
164 IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error)
165 // ListUnclassifiedUsers returns users who are not trusted or blacklisted
166 ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error)
167 // GetEventsForPubkey returns events for a specific pubkey
168 GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error)
169 // DeleteEventsForPubkey deletes all events for a pubkey
170 DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error)
171 // ScanAllPubkeys scans and indexes all pubkeys in the database
172 ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error)
173 // SubscribePubkey activates a subscription for a pubkey
174 SubscribePubkey(ctx context.Context, in *SubscribeRequest, opts ...grpc.CallOption) (*Empty, error)
175 // UnsubscribePubkey removes a subscription
176 UnsubscribePubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
177 // IsSubscribed checks if a pubkey has an active subscription
178 IsSubscribed(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*BoolResponse, error)
179 // GetSubscription returns subscription details for a pubkey
180 GetSubscription(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*SubscriptionResponse, error)
181 // ClaimAlias claims an email alias for a pubkey
182 ClaimAlias(ctx context.Context, in *ClaimAliasRequest, opts ...grpc.CallOption) (*Empty, error)
183 // GetAliasByPubkey returns the alias for a pubkey
184 GetAliasByPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*AliasResponse, error)
185 // GetPubkeyByAlias returns the pubkey for an alias
186 GetPubkeyByAlias(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*PubkeyResponse, error)
187 // IsAliasTaken checks if an alias is already claimed
188 IsAliasTaken(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*BoolResponse, error)
189 }
190
191 type aCLServiceClient struct {
192 cc grpc.ClientConnInterface
193 }
194
195 func NewACLServiceClient(cc grpc.ClientConnInterface) ACLServiceClient {
196 return &aCLServiceClient{cc}
197 }
198
199 func (c *aCLServiceClient) GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error) {
200 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
201 out := new(AccessLevelResponse)
202 err := c.cc.Invoke(ctx, ACLService_GetAccessLevel_FullMethodName, in, out, cOpts...)
203 if err != nil {
204 return nil, err
205 }
206 return out, nil
207 }
208
209 func (c *aCLServiceClient) CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error) {
210 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
211 out := new(PolicyCheckResponse)
212 err := c.cc.Invoke(ctx, ACLService_CheckPolicy_FullMethodName, in, out, cOpts...)
213 if err != nil {
214 return nil, err
215 }
216 return out, nil
217 }
218
219 func (c *aCLServiceClient) GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error) {
220 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
221 out := new(ACLInfoResponse)
222 err := c.cc.Invoke(ctx, ACLService_GetACLInfo_FullMethodName, in, out, cOpts...)
223 if err != nil {
224 return nil, err
225 }
226 return out, nil
227 }
228
229 func (c *aCLServiceClient) GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error) {
230 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
231 out := new(ModeResponse)
232 err := c.cc.Invoke(ctx, ACLService_GetMode_FullMethodName, in, out, cOpts...)
233 if err != nil {
234 return nil, err
235 }
236 return out, nil
237 }
238
239 func (c *aCLServiceClient) Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error) {
240 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
241 out := new(ReadyResponse)
242 err := c.cc.Invoke(ctx, ACLService_Ready_FullMethodName, in, out, cOpts...)
243 if err != nil {
244 return nil, err
245 }
246 return out, nil
247 }
248
249 func (c *aCLServiceClient) GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error) {
250 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
251 out := new(ThrottleDelayResponse)
252 err := c.cc.Invoke(ctx, ACLService_GetThrottleDelay_FullMethodName, in, out, cOpts...)
253 if err != nil {
254 return nil, err
255 }
256 return out, nil
257 }
258
259 func (c *aCLServiceClient) AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error) {
260 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
261 out := new(Empty)
262 err := c.cc.Invoke(ctx, ACLService_AddFollow_FullMethodName, in, out, cOpts...)
263 if err != nil {
264 return nil, err
265 }
266 return out, nil
267 }
268
269 func (c *aCLServiceClient) GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error) {
270 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
271 out := new(FollowedPubkeysResponse)
272 err := c.cc.Invoke(ctx, ACLService_GetFollowedPubkeys_FullMethodName, in, out, cOpts...)
273 if err != nil {
274 return nil, err
275 }
276 return out, nil
277 }
278
279 func (c *aCLServiceClient) GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error) {
280 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
281 out := new(AdminRelaysResponse)
282 err := c.cc.Invoke(ctx, ACLService_GetAdminRelays_FullMethodName, in, out, cOpts...)
283 if err != nil {
284 return nil, err
285 }
286 return out, nil
287 }
288
289 func (c *aCLServiceClient) BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
290 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
291 out := new(Empty)
292 err := c.cc.Invoke(ctx, ACLService_BanPubkey_FullMethodName, in, out, cOpts...)
293 if err != nil {
294 return nil, err
295 }
296 return out, nil
297 }
298
299 func (c *aCLServiceClient) UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
300 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
301 out := new(Empty)
302 err := c.cc.Invoke(ctx, ACLService_UnbanPubkey_FullMethodName, in, out, cOpts...)
303 if err != nil {
304 return nil, err
305 }
306 return out, nil
307 }
308
309 func (c *aCLServiceClient) ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error) {
310 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
311 out := new(ListBannedPubkeysResponse)
312 err := c.cc.Invoke(ctx, ACLService_ListBannedPubkeys_FullMethodName, in, out, cOpts...)
313 if err != nil {
314 return nil, err
315 }
316 return out, nil
317 }
318
319 func (c *aCLServiceClient) AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
320 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
321 out := new(Empty)
322 err := c.cc.Invoke(ctx, ACLService_AllowPubkey_FullMethodName, in, out, cOpts...)
323 if err != nil {
324 return nil, err
325 }
326 return out, nil
327 }
328
329 func (c *aCLServiceClient) DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
330 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
331 out := new(Empty)
332 err := c.cc.Invoke(ctx, ACLService_DisallowPubkey_FullMethodName, in, out, cOpts...)
333 if err != nil {
334 return nil, err
335 }
336 return out, nil
337 }
338
339 func (c *aCLServiceClient) ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error) {
340 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
341 out := new(ListAllowedPubkeysResponse)
342 err := c.cc.Invoke(ctx, ACLService_ListAllowedPubkeys_FullMethodName, in, out, cOpts...)
343 if err != nil {
344 return nil, err
345 }
346 return out, nil
347 }
348
349 func (c *aCLServiceClient) BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
350 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
351 out := new(Empty)
352 err := c.cc.Invoke(ctx, ACLService_BanEvent_FullMethodName, in, out, cOpts...)
353 if err != nil {
354 return nil, err
355 }
356 return out, nil
357 }
358
359 func (c *aCLServiceClient) UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
360 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
361 out := new(Empty)
362 err := c.cc.Invoke(ctx, ACLService_UnbanEvent_FullMethodName, in, out, cOpts...)
363 if err != nil {
364 return nil, err
365 }
366 return out, nil
367 }
368
369 func (c *aCLServiceClient) ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error) {
370 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
371 out := new(ListBannedEventsResponse)
372 err := c.cc.Invoke(ctx, ACLService_ListBannedEvents_FullMethodName, in, out, cOpts...)
373 if err != nil {
374 return nil, err
375 }
376 return out, nil
377 }
378
379 func (c *aCLServiceClient) AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
380 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
381 out := new(Empty)
382 err := c.cc.Invoke(ctx, ACLService_AllowEvent_FullMethodName, in, out, cOpts...)
383 if err != nil {
384 return nil, err
385 }
386 return out, nil
387 }
388
389 func (c *aCLServiceClient) DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
390 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
391 out := new(Empty)
392 err := c.cc.Invoke(ctx, ACLService_DisallowEvent_FullMethodName, in, out, cOpts...)
393 if err != nil {
394 return nil, err
395 }
396 return out, nil
397 }
398
399 func (c *aCLServiceClient) ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error) {
400 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
401 out := new(ListAllowedEventsResponse)
402 err := c.cc.Invoke(ctx, ACLService_ListAllowedEvents_FullMethodName, in, out, cOpts...)
403 if err != nil {
404 return nil, err
405 }
406 return out, nil
407 }
408
409 func (c *aCLServiceClient) BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error) {
410 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
411 out := new(Empty)
412 err := c.cc.Invoke(ctx, ACLService_BlockIP_FullMethodName, in, out, cOpts...)
413 if err != nil {
414 return nil, err
415 }
416 return out, nil
417 }
418
419 func (c *aCLServiceClient) UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error) {
420 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
421 out := new(Empty)
422 err := c.cc.Invoke(ctx, ACLService_UnblockIP_FullMethodName, in, out, cOpts...)
423 if err != nil {
424 return nil, err
425 }
426 return out, nil
427 }
428
429 func (c *aCLServiceClient) ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error) {
430 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
431 out := new(ListBlockedIPsResponse)
432 err := c.cc.Invoke(ctx, ACLService_ListBlockedIPs_FullMethodName, in, out, cOpts...)
433 if err != nil {
434 return nil, err
435 }
436 return out, nil
437 }
438
439 func (c *aCLServiceClient) AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error) {
440 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
441 out := new(Empty)
442 err := c.cc.Invoke(ctx, ACLService_AllowKind_FullMethodName, in, out, cOpts...)
443 if err != nil {
444 return nil, err
445 }
446 return out, nil
447 }
448
449 func (c *aCLServiceClient) DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error) {
450 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
451 out := new(Empty)
452 err := c.cc.Invoke(ctx, ACLService_DisallowKind_FullMethodName, in, out, cOpts...)
453 if err != nil {
454 return nil, err
455 }
456 return out, nil
457 }
458
459 func (c *aCLServiceClient) ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error) {
460 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
461 out := new(ListAllowedKindsResponse)
462 err := c.cc.Invoke(ctx, ACLService_ListAllowedKinds_FullMethodName, in, out, cOpts...)
463 if err != nil {
464 return nil, err
465 }
466 return out, nil
467 }
468
469 func (c *aCLServiceClient) UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error) {
470 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
471 out := new(Empty)
472 err := c.cc.Invoke(ctx, ACLService_UpdatePeerAdmins_FullMethodName, in, out, cOpts...)
473 if err != nil {
474 return nil, err
475 }
476 return out, nil
477 }
478
479 func (c *aCLServiceClient) TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
480 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
481 out := new(Empty)
482 err := c.cc.Invoke(ctx, ACLService_TrustPubkey_FullMethodName, in, out, cOpts...)
483 if err != nil {
484 return nil, err
485 }
486 return out, nil
487 }
488
489 func (c *aCLServiceClient) UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
490 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
491 out := new(Empty)
492 err := c.cc.Invoke(ctx, ACLService_UntrustPubkey_FullMethodName, in, out, cOpts...)
493 if err != nil {
494 return nil, err
495 }
496 return out, nil
497 }
498
499 func (c *aCLServiceClient) ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error) {
500 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
501 out := new(ListTrustedPubkeysResponse)
502 err := c.cc.Invoke(ctx, ACLService_ListTrustedPubkeys_FullMethodName, in, out, cOpts...)
503 if err != nil {
504 return nil, err
505 }
506 return out, nil
507 }
508
509 func (c *aCLServiceClient) BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
510 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
511 out := new(Empty)
512 err := c.cc.Invoke(ctx, ACLService_BlacklistPubkey_FullMethodName, in, out, cOpts...)
513 if err != nil {
514 return nil, err
515 }
516 return out, nil
517 }
518
519 func (c *aCLServiceClient) UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
520 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
521 out := new(Empty)
522 err := c.cc.Invoke(ctx, ACLService_UnblacklistPubkey_FullMethodName, in, out, cOpts...)
523 if err != nil {
524 return nil, err
525 }
526 return out, nil
527 }
528
529 func (c *aCLServiceClient) ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error) {
530 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
531 out := new(ListBlacklistedPubkeysResponse)
532 err := c.cc.Invoke(ctx, ACLService_ListBlacklistedPubkeys_FullMethodName, in, out, cOpts...)
533 if err != nil {
534 return nil, err
535 }
536 return out, nil
537 }
538
539 func (c *aCLServiceClient) MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error) {
540 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
541 out := new(Empty)
542 err := c.cc.Invoke(ctx, ACLService_MarkSpam_FullMethodName, in, out, cOpts...)
543 if err != nil {
544 return nil, err
545 }
546 return out, nil
547 }
548
549 func (c *aCLServiceClient) UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
550 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
551 out := new(Empty)
552 err := c.cc.Invoke(ctx, ACLService_UnmarkSpam_FullMethodName, in, out, cOpts...)
553 if err != nil {
554 return nil, err
555 }
556 return out, nil
557 }
558
559 func (c *aCLServiceClient) ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error) {
560 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
561 out := new(ListSpamEventsResponse)
562 err := c.cc.Invoke(ctx, ACLService_ListSpamEvents_FullMethodName, in, out, cOpts...)
563 if err != nil {
564 return nil, err
565 }
566 return out, nil
567 }
568
569 func (c *aCLServiceClient) RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error) {
570 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
571 out := new(RateLimitCheckResponse)
572 err := c.cc.Invoke(ctx, ACLService_RateLimitCheck_FullMethodName, in, out, cOpts...)
573 if err != nil {
574 return nil, err
575 }
576 return out, nil
577 }
578
579 func (c *aCLServiceClient) ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error) {
580 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
581 out := new(Empty)
582 err := c.cc.Invoke(ctx, ACLService_ProcessConfigEvent_FullMethodName, in, out, cOpts...)
583 if err != nil {
584 return nil, err
585 }
586 return out, nil
587 }
588
589 func (c *aCLServiceClient) GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error) {
590 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
591 out := new(CuratingConfig)
592 err := c.cc.Invoke(ctx, ACLService_GetCuratingConfig_FullMethodName, in, out, cOpts...)
593 if err != nil {
594 return nil, err
595 }
596 return out, nil
597 }
598
599 func (c *aCLServiceClient) IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error) {
600 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
601 out := new(BoolResponse)
602 err := c.cc.Invoke(ctx, ACLService_IsCuratingConfigured_FullMethodName, in, out, cOpts...)
603 if err != nil {
604 return nil, err
605 }
606 return out, nil
607 }
608
609 func (c *aCLServiceClient) ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error) {
610 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
611 out := new(ListUnclassifiedUsersResponse)
612 err := c.cc.Invoke(ctx, ACLService_ListUnclassifiedUsers_FullMethodName, in, out, cOpts...)
613 if err != nil {
614 return nil, err
615 }
616 return out, nil
617 }
618
619 func (c *aCLServiceClient) GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error) {
620 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
621 out := new(EventsForPubkeyResponse)
622 err := c.cc.Invoke(ctx, ACLService_GetEventsForPubkey_FullMethodName, in, out, cOpts...)
623 if err != nil {
624 return nil, err
625 }
626 return out, nil
627 }
628
629 func (c *aCLServiceClient) DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error) {
630 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
631 out := new(DeleteCountResponse)
632 err := c.cc.Invoke(ctx, ACLService_DeleteEventsForPubkey_FullMethodName, in, out, cOpts...)
633 if err != nil {
634 return nil, err
635 }
636 return out, nil
637 }
638
639 func (c *aCLServiceClient) ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error) {
640 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
641 out := new(ScanResultResponse)
642 err := c.cc.Invoke(ctx, ACLService_ScanAllPubkeys_FullMethodName, in, out, cOpts...)
643 if err != nil {
644 return nil, err
645 }
646 return out, nil
647 }
648
649 func (c *aCLServiceClient) SubscribePubkey(ctx context.Context, in *SubscribeRequest, opts ...grpc.CallOption) (*Empty, error) {
650 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
651 out := new(Empty)
652 err := c.cc.Invoke(ctx, ACLService_SubscribePubkey_FullMethodName, in, out, cOpts...)
653 if err != nil {
654 return nil, err
655 }
656 return out, nil
657 }
658
659 func (c *aCLServiceClient) UnsubscribePubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
660 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
661 out := new(Empty)
662 err := c.cc.Invoke(ctx, ACLService_UnsubscribePubkey_FullMethodName, in, out, cOpts...)
663 if err != nil {
664 return nil, err
665 }
666 return out, nil
667 }
668
669 func (c *aCLServiceClient) IsSubscribed(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*BoolResponse, error) {
670 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
671 out := new(BoolResponse)
672 err := c.cc.Invoke(ctx, ACLService_IsSubscribed_FullMethodName, in, out, cOpts...)
673 if err != nil {
674 return nil, err
675 }
676 return out, nil
677 }
678
679 func (c *aCLServiceClient) GetSubscription(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*SubscriptionResponse, error) {
680 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
681 out := new(SubscriptionResponse)
682 err := c.cc.Invoke(ctx, ACLService_GetSubscription_FullMethodName, in, out, cOpts...)
683 if err != nil {
684 return nil, err
685 }
686 return out, nil
687 }
688
689 func (c *aCLServiceClient) ClaimAlias(ctx context.Context, in *ClaimAliasRequest, opts ...grpc.CallOption) (*Empty, error) {
690 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
691 out := new(Empty)
692 err := c.cc.Invoke(ctx, ACLService_ClaimAlias_FullMethodName, in, out, cOpts...)
693 if err != nil {
694 return nil, err
695 }
696 return out, nil
697 }
698
699 func (c *aCLServiceClient) GetAliasByPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*AliasResponse, error) {
700 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
701 out := new(AliasResponse)
702 err := c.cc.Invoke(ctx, ACLService_GetAliasByPubkey_FullMethodName, in, out, cOpts...)
703 if err != nil {
704 return nil, err
705 }
706 return out, nil
707 }
708
709 func (c *aCLServiceClient) GetPubkeyByAlias(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*PubkeyResponse, error) {
710 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
711 out := new(PubkeyResponse)
712 err := c.cc.Invoke(ctx, ACLService_GetPubkeyByAlias_FullMethodName, in, out, cOpts...)
713 if err != nil {
714 return nil, err
715 }
716 return out, nil
717 }
718
719 func (c *aCLServiceClient) IsAliasTaken(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*BoolResponse, error) {
720 cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
721 out := new(BoolResponse)
722 err := c.cc.Invoke(ctx, ACLService_IsAliasTaken_FullMethodName, in, out, cOpts...)
723 if err != nil {
724 return nil, err
725 }
726 return out, nil
727 }
728
729 // ACLServiceServer is the server API for ACLService service.
730 // All implementations must embed UnimplementedACLServiceServer
731 // for forward compatibility.
732 //
733 // ACLService provides access control operations for the Nostr relay
734 type ACLServiceServer interface {
735 // GetAccessLevel returns the access level for a pubkey from an IP address
736 GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error)
737 // CheckPolicy checks if an event passes policy checks
738 CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error)
739 // GetACLInfo returns information about the active ACL mode
740 GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error)
741 // GetMode returns the current ACL mode (none/follows/managed/curating)
742 GetMode(context.Context, *Empty) (*ModeResponse, error)
743 // Ready checks if the ACL service is ready
744 Ready(context.Context, *Empty) (*ReadyResponse, error)
745 // GetThrottleDelay returns the progressive throttle delay for a pubkey
746 GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error)
747 // AddFollow adds a pubkey to the followed list
748 AddFollow(context.Context, *AddFollowRequest) (*Empty, error)
749 // GetFollowedPubkeys returns all followed pubkeys
750 GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error)
751 // GetAdminRelays returns the relay URLs from admin kind 10002 events
752 GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error)
753 // BanPubkey adds a pubkey to the ban list
754 BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error)
755 // UnbanPubkey removes a pubkey from the ban list
756 UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error)
757 // ListBannedPubkeys returns all banned pubkeys
758 ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error)
759 // AllowPubkey adds a pubkey to the allow list
760 AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error)
761 // DisallowPubkey removes a pubkey from the allow list
762 DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error)
763 // ListAllowedPubkeys returns all explicitly allowed pubkeys
764 ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error)
765 // BanEvent adds an event to the ban list
766 BanEvent(context.Context, *BanEventRequest) (*Empty, error)
767 // UnbanEvent removes an event from the ban list
768 UnbanEvent(context.Context, *EventRequest) (*Empty, error)
769 // ListBannedEvents returns all banned events
770 ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error)
771 // AllowEvent adds an event to the allow list
772 AllowEvent(context.Context, *BanEventRequest) (*Empty, error)
773 // DisallowEvent removes an event from the allow list
774 DisallowEvent(context.Context, *EventRequest) (*Empty, error)
775 // ListAllowedEvents returns all explicitly allowed events
776 ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error)
777 // BlockIP adds an IP to the block list
778 BlockIP(context.Context, *BlockIPRequest) (*Empty, error)
779 // UnblockIP removes an IP from the block list
780 UnblockIP(context.Context, *IPRequest) (*Empty, error)
781 // ListBlockedIPs returns all blocked IPs
782 ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error)
783 // AllowKind adds a kind to the allow list
784 AllowKind(context.Context, *AllowKindRequest) (*Empty, error)
785 // DisallowKind removes a kind from the allow list
786 DisallowKind(context.Context, *KindRequest) (*Empty, error)
787 // ListAllowedKinds returns all allowed kinds
788 ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error)
789 // UpdatePeerAdmins updates the peer relay identity pubkeys
790 UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error)
791 // TrustPubkey adds a pubkey to the trusted list
792 TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error)
793 // UntrustPubkey removes a pubkey from the trusted list
794 UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error)
795 // ListTrustedPubkeys returns all trusted pubkeys
796 ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error)
797 // BlacklistPubkey adds a pubkey to the blacklist
798 BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error)
799 // UnblacklistPubkey removes a pubkey from the blacklist
800 UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error)
801 // ListBlacklistedPubkeys returns all blacklisted pubkeys
802 ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error)
803 // MarkSpam marks an event as spam
804 MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error)
805 // UnmarkSpam removes the spam flag from an event
806 UnmarkSpam(context.Context, *EventRequest) (*Empty, error)
807 // ListSpamEvents returns all spam-flagged events
808 ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error)
809 // RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
810 RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error)
811 // ProcessConfigEvent processes a curating config event (kind 30078)
812 ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error)
813 // GetCuratingConfig returns the current curating configuration
814 GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error)
815 // IsCuratingConfigured checks if curating mode is configured
816 IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error)
817 // ListUnclassifiedUsers returns users who are not trusted or blacklisted
818 ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error)
819 // GetEventsForPubkey returns events for a specific pubkey
820 GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error)
821 // DeleteEventsForPubkey deletes all events for a pubkey
822 DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error)
823 // ScanAllPubkeys scans and indexes all pubkeys in the database
824 ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error)
825 // SubscribePubkey activates a subscription for a pubkey
826 SubscribePubkey(context.Context, *SubscribeRequest) (*Empty, error)
827 // UnsubscribePubkey removes a subscription
828 UnsubscribePubkey(context.Context, *PubkeyRequest) (*Empty, error)
829 // IsSubscribed checks if a pubkey has an active subscription
830 IsSubscribed(context.Context, *PubkeyRequest) (*BoolResponse, error)
831 // GetSubscription returns subscription details for a pubkey
832 GetSubscription(context.Context, *PubkeyRequest) (*SubscriptionResponse, error)
833 // ClaimAlias claims an email alias for a pubkey
834 ClaimAlias(context.Context, *ClaimAliasRequest) (*Empty, error)
835 // GetAliasByPubkey returns the alias for a pubkey
836 GetAliasByPubkey(context.Context, *PubkeyRequest) (*AliasResponse, error)
837 // GetPubkeyByAlias returns the pubkey for an alias
838 GetPubkeyByAlias(context.Context, *AliasRequest) (*PubkeyResponse, error)
839 // IsAliasTaken checks if an alias is already claimed
840 IsAliasTaken(context.Context, *AliasRequest) (*BoolResponse, error)
841 mustEmbedUnimplementedACLServiceServer()
842 }
843
844 // UnimplementedACLServiceServer must be embedded to have
845 // forward compatible implementations.
846 //
847 // NOTE: this should be embedded by value instead of pointer to avoid a nil
848 // pointer dereference when methods are called.
849 type UnimplementedACLServiceServer struct{}
850
851 func (UnimplementedACLServiceServer) GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error) {
852 return nil, status.Error(codes.Unimplemented, "method GetAccessLevel not implemented")
853 }
854 func (UnimplementedACLServiceServer) CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error) {
855 return nil, status.Error(codes.Unimplemented, "method CheckPolicy not implemented")
856 }
857 func (UnimplementedACLServiceServer) GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error) {
858 return nil, status.Error(codes.Unimplemented, "method GetACLInfo not implemented")
859 }
860 func (UnimplementedACLServiceServer) GetMode(context.Context, *Empty) (*ModeResponse, error) {
861 return nil, status.Error(codes.Unimplemented, "method GetMode not implemented")
862 }
863 func (UnimplementedACLServiceServer) Ready(context.Context, *Empty) (*ReadyResponse, error) {
864 return nil, status.Error(codes.Unimplemented, "method Ready not implemented")
865 }
866 func (UnimplementedACLServiceServer) GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error) {
867 return nil, status.Error(codes.Unimplemented, "method GetThrottleDelay not implemented")
868 }
869 func (UnimplementedACLServiceServer) AddFollow(context.Context, *AddFollowRequest) (*Empty, error) {
870 return nil, status.Error(codes.Unimplemented, "method AddFollow not implemented")
871 }
872 func (UnimplementedACLServiceServer) GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error) {
873 return nil, status.Error(codes.Unimplemented, "method GetFollowedPubkeys not implemented")
874 }
875 func (UnimplementedACLServiceServer) GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error) {
876 return nil, status.Error(codes.Unimplemented, "method GetAdminRelays not implemented")
877 }
878 func (UnimplementedACLServiceServer) BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error) {
879 return nil, status.Error(codes.Unimplemented, "method BanPubkey not implemented")
880 }
881 func (UnimplementedACLServiceServer) UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
882 return nil, status.Error(codes.Unimplemented, "method UnbanPubkey not implemented")
883 }
884 func (UnimplementedACLServiceServer) ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error) {
885 return nil, status.Error(codes.Unimplemented, "method ListBannedPubkeys not implemented")
886 }
887 func (UnimplementedACLServiceServer) AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error) {
888 return nil, status.Error(codes.Unimplemented, "method AllowPubkey not implemented")
889 }
890 func (UnimplementedACLServiceServer) DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
891 return nil, status.Error(codes.Unimplemented, "method DisallowPubkey not implemented")
892 }
893 func (UnimplementedACLServiceServer) ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error) {
894 return nil, status.Error(codes.Unimplemented, "method ListAllowedPubkeys not implemented")
895 }
896 func (UnimplementedACLServiceServer) BanEvent(context.Context, *BanEventRequest) (*Empty, error) {
897 return nil, status.Error(codes.Unimplemented, "method BanEvent not implemented")
898 }
899 func (UnimplementedACLServiceServer) UnbanEvent(context.Context, *EventRequest) (*Empty, error) {
900 return nil, status.Error(codes.Unimplemented, "method UnbanEvent not implemented")
901 }
902 func (UnimplementedACLServiceServer) ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error) {
903 return nil, status.Error(codes.Unimplemented, "method ListBannedEvents not implemented")
904 }
905 func (UnimplementedACLServiceServer) AllowEvent(context.Context, *BanEventRequest) (*Empty, error) {
906 return nil, status.Error(codes.Unimplemented, "method AllowEvent not implemented")
907 }
908 func (UnimplementedACLServiceServer) DisallowEvent(context.Context, *EventRequest) (*Empty, error) {
909 return nil, status.Error(codes.Unimplemented, "method DisallowEvent not implemented")
910 }
911 func (UnimplementedACLServiceServer) ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error) {
912 return nil, status.Error(codes.Unimplemented, "method ListAllowedEvents not implemented")
913 }
914 func (UnimplementedACLServiceServer) BlockIP(context.Context, *BlockIPRequest) (*Empty, error) {
915 return nil, status.Error(codes.Unimplemented, "method BlockIP not implemented")
916 }
917 func (UnimplementedACLServiceServer) UnblockIP(context.Context, *IPRequest) (*Empty, error) {
918 return nil, status.Error(codes.Unimplemented, "method UnblockIP not implemented")
919 }
920 func (UnimplementedACLServiceServer) ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error) {
921 return nil, status.Error(codes.Unimplemented, "method ListBlockedIPs not implemented")
922 }
923 func (UnimplementedACLServiceServer) AllowKind(context.Context, *AllowKindRequest) (*Empty, error) {
924 return nil, status.Error(codes.Unimplemented, "method AllowKind not implemented")
925 }
926 func (UnimplementedACLServiceServer) DisallowKind(context.Context, *KindRequest) (*Empty, error) {
927 return nil, status.Error(codes.Unimplemented, "method DisallowKind not implemented")
928 }
929 func (UnimplementedACLServiceServer) ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error) {
930 return nil, status.Error(codes.Unimplemented, "method ListAllowedKinds not implemented")
931 }
932 func (UnimplementedACLServiceServer) UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error) {
933 return nil, status.Error(codes.Unimplemented, "method UpdatePeerAdmins not implemented")
934 }
935 func (UnimplementedACLServiceServer) TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error) {
936 return nil, status.Error(codes.Unimplemented, "method TrustPubkey not implemented")
937 }
938 func (UnimplementedACLServiceServer) UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
939 return nil, status.Error(codes.Unimplemented, "method UntrustPubkey not implemented")
940 }
941 func (UnimplementedACLServiceServer) ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error) {
942 return nil, status.Error(codes.Unimplemented, "method ListTrustedPubkeys not implemented")
943 }
944 func (UnimplementedACLServiceServer) BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error) {
945 return nil, status.Error(codes.Unimplemented, "method BlacklistPubkey not implemented")
946 }
947 func (UnimplementedACLServiceServer) UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
948 return nil, status.Error(codes.Unimplemented, "method UnblacklistPubkey not implemented")
949 }
950 func (UnimplementedACLServiceServer) ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error) {
951 return nil, status.Error(codes.Unimplemented, "method ListBlacklistedPubkeys not implemented")
952 }
953 func (UnimplementedACLServiceServer) MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error) {
954 return nil, status.Error(codes.Unimplemented, "method MarkSpam not implemented")
955 }
956 func (UnimplementedACLServiceServer) UnmarkSpam(context.Context, *EventRequest) (*Empty, error) {
957 return nil, status.Error(codes.Unimplemented, "method UnmarkSpam not implemented")
958 }
959 func (UnimplementedACLServiceServer) ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error) {
960 return nil, status.Error(codes.Unimplemented, "method ListSpamEvents not implemented")
961 }
962 func (UnimplementedACLServiceServer) RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error) {
963 return nil, status.Error(codes.Unimplemented, "method RateLimitCheck not implemented")
964 }
965 func (UnimplementedACLServiceServer) ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error) {
966 return nil, status.Error(codes.Unimplemented, "method ProcessConfigEvent not implemented")
967 }
968 func (UnimplementedACLServiceServer) GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error) {
969 return nil, status.Error(codes.Unimplemented, "method GetCuratingConfig not implemented")
970 }
971 func (UnimplementedACLServiceServer) IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error) {
972 return nil, status.Error(codes.Unimplemented, "method IsCuratingConfigured not implemented")
973 }
974 func (UnimplementedACLServiceServer) ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error) {
975 return nil, status.Error(codes.Unimplemented, "method ListUnclassifiedUsers not implemented")
976 }
977 func (UnimplementedACLServiceServer) GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error) {
978 return nil, status.Error(codes.Unimplemented, "method GetEventsForPubkey not implemented")
979 }
980 func (UnimplementedACLServiceServer) DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error) {
981 return nil, status.Error(codes.Unimplemented, "method DeleteEventsForPubkey not implemented")
982 }
983 func (UnimplementedACLServiceServer) ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error) {
984 return nil, status.Error(codes.Unimplemented, "method ScanAllPubkeys not implemented")
985 }
986 func (UnimplementedACLServiceServer) SubscribePubkey(context.Context, *SubscribeRequest) (*Empty, error) {
987 return nil, status.Error(codes.Unimplemented, "method SubscribePubkey not implemented")
988 }
989 func (UnimplementedACLServiceServer) UnsubscribePubkey(context.Context, *PubkeyRequest) (*Empty, error) {
990 return nil, status.Error(codes.Unimplemented, "method UnsubscribePubkey not implemented")
991 }
992 func (UnimplementedACLServiceServer) IsSubscribed(context.Context, *PubkeyRequest) (*BoolResponse, error) {
993 return nil, status.Error(codes.Unimplemented, "method IsSubscribed not implemented")
994 }
995 func (UnimplementedACLServiceServer) GetSubscription(context.Context, *PubkeyRequest) (*SubscriptionResponse, error) {
996 return nil, status.Error(codes.Unimplemented, "method GetSubscription not implemented")
997 }
998 func (UnimplementedACLServiceServer) ClaimAlias(context.Context, *ClaimAliasRequest) (*Empty, error) {
999 return nil, status.Error(codes.Unimplemented, "method ClaimAlias not implemented")
1000 }
1001 func (UnimplementedACLServiceServer) GetAliasByPubkey(context.Context, *PubkeyRequest) (*AliasResponse, error) {
1002 return nil, status.Error(codes.Unimplemented, "method GetAliasByPubkey not implemented")
1003 }
1004 func (UnimplementedACLServiceServer) GetPubkeyByAlias(context.Context, *AliasRequest) (*PubkeyResponse, error) {
1005 return nil, status.Error(codes.Unimplemented, "method GetPubkeyByAlias not implemented")
1006 }
1007 func (UnimplementedACLServiceServer) IsAliasTaken(context.Context, *AliasRequest) (*BoolResponse, error) {
1008 return nil, status.Error(codes.Unimplemented, "method IsAliasTaken not implemented")
1009 }
1010 func (UnimplementedACLServiceServer) mustEmbedUnimplementedACLServiceServer() {}
1011 func (UnimplementedACLServiceServer) testEmbeddedByValue() {}
1012
1013 // UnsafeACLServiceServer may be embedded to opt out of forward compatibility for this service.
1014 // Use of this interface is not recommended, as added methods to ACLServiceServer will
1015 // result in compilation errors.
1016 type UnsafeACLServiceServer interface {
1017 mustEmbedUnimplementedACLServiceServer()
1018 }
1019
1020 func RegisterACLServiceServer(s grpc.ServiceRegistrar, srv ACLServiceServer) {
1021 // If the following call panics, it indicates UnimplementedACLServiceServer was
1022 // embedded by pointer and is nil. This will cause panics if an
1023 // unimplemented method is ever invoked, so we test this at initialization
1024 // time to prevent it from happening at runtime later due to I/O.
1025 if t, ok := srv.(interface{ testEmbeddedByValue() }); ok {
1026 t.testEmbeddedByValue()
1027 }
1028 s.RegisterService(&ACLService_ServiceDesc, srv)
1029 }
1030
1031 func _ACLService_GetAccessLevel_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1032 in := new(AccessLevelRequest)
1033 if err := dec(in); err != nil {
1034 return nil, err
1035 }
1036 if interceptor == nil {
1037 return srv.(ACLServiceServer).GetAccessLevel(ctx, in)
1038 }
1039 info := &grpc.UnaryServerInfo{
1040 Server: srv,
1041 FullMethod: ACLService_GetAccessLevel_FullMethodName,
1042 }
1043 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1044 return srv.(ACLServiceServer).GetAccessLevel(ctx, req.(*AccessLevelRequest))
1045 }
1046 return interceptor(ctx, in, info, handler)
1047 }
1048
1049 func _ACLService_CheckPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1050 in := new(PolicyCheckRequest)
1051 if err := dec(in); err != nil {
1052 return nil, err
1053 }
1054 if interceptor == nil {
1055 return srv.(ACLServiceServer).CheckPolicy(ctx, in)
1056 }
1057 info := &grpc.UnaryServerInfo{
1058 Server: srv,
1059 FullMethod: ACLService_CheckPolicy_FullMethodName,
1060 }
1061 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1062 return srv.(ACLServiceServer).CheckPolicy(ctx, req.(*PolicyCheckRequest))
1063 }
1064 return interceptor(ctx, in, info, handler)
1065 }
1066
1067 func _ACLService_GetACLInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1068 in := new(Empty)
1069 if err := dec(in); err != nil {
1070 return nil, err
1071 }
1072 if interceptor == nil {
1073 return srv.(ACLServiceServer).GetACLInfo(ctx, in)
1074 }
1075 info := &grpc.UnaryServerInfo{
1076 Server: srv,
1077 FullMethod: ACLService_GetACLInfo_FullMethodName,
1078 }
1079 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1080 return srv.(ACLServiceServer).GetACLInfo(ctx, req.(*Empty))
1081 }
1082 return interceptor(ctx, in, info, handler)
1083 }
1084
1085 func _ACLService_GetMode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1086 in := new(Empty)
1087 if err := dec(in); err != nil {
1088 return nil, err
1089 }
1090 if interceptor == nil {
1091 return srv.(ACLServiceServer).GetMode(ctx, in)
1092 }
1093 info := &grpc.UnaryServerInfo{
1094 Server: srv,
1095 FullMethod: ACLService_GetMode_FullMethodName,
1096 }
1097 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1098 return srv.(ACLServiceServer).GetMode(ctx, req.(*Empty))
1099 }
1100 return interceptor(ctx, in, info, handler)
1101 }
1102
1103 func _ACLService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1104 in := new(Empty)
1105 if err := dec(in); err != nil {
1106 return nil, err
1107 }
1108 if interceptor == nil {
1109 return srv.(ACLServiceServer).Ready(ctx, in)
1110 }
1111 info := &grpc.UnaryServerInfo{
1112 Server: srv,
1113 FullMethod: ACLService_Ready_FullMethodName,
1114 }
1115 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1116 return srv.(ACLServiceServer).Ready(ctx, req.(*Empty))
1117 }
1118 return interceptor(ctx, in, info, handler)
1119 }
1120
1121 func _ACLService_GetThrottleDelay_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1122 in := new(ThrottleDelayRequest)
1123 if err := dec(in); err != nil {
1124 return nil, err
1125 }
1126 if interceptor == nil {
1127 return srv.(ACLServiceServer).GetThrottleDelay(ctx, in)
1128 }
1129 info := &grpc.UnaryServerInfo{
1130 Server: srv,
1131 FullMethod: ACLService_GetThrottleDelay_FullMethodName,
1132 }
1133 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1134 return srv.(ACLServiceServer).GetThrottleDelay(ctx, req.(*ThrottleDelayRequest))
1135 }
1136 return interceptor(ctx, in, info, handler)
1137 }
1138
1139 func _ACLService_AddFollow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1140 in := new(AddFollowRequest)
1141 if err := dec(in); err != nil {
1142 return nil, err
1143 }
1144 if interceptor == nil {
1145 return srv.(ACLServiceServer).AddFollow(ctx, in)
1146 }
1147 info := &grpc.UnaryServerInfo{
1148 Server: srv,
1149 FullMethod: ACLService_AddFollow_FullMethodName,
1150 }
1151 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1152 return srv.(ACLServiceServer).AddFollow(ctx, req.(*AddFollowRequest))
1153 }
1154 return interceptor(ctx, in, info, handler)
1155 }
1156
1157 func _ACLService_GetFollowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1158 in := new(Empty)
1159 if err := dec(in); err != nil {
1160 return nil, err
1161 }
1162 if interceptor == nil {
1163 return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, in)
1164 }
1165 info := &grpc.UnaryServerInfo{
1166 Server: srv,
1167 FullMethod: ACLService_GetFollowedPubkeys_FullMethodName,
1168 }
1169 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1170 return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, req.(*Empty))
1171 }
1172 return interceptor(ctx, in, info, handler)
1173 }
1174
1175 func _ACLService_GetAdminRelays_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1176 in := new(Empty)
1177 if err := dec(in); err != nil {
1178 return nil, err
1179 }
1180 if interceptor == nil {
1181 return srv.(ACLServiceServer).GetAdminRelays(ctx, in)
1182 }
1183 info := &grpc.UnaryServerInfo{
1184 Server: srv,
1185 FullMethod: ACLService_GetAdminRelays_FullMethodName,
1186 }
1187 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1188 return srv.(ACLServiceServer).GetAdminRelays(ctx, req.(*Empty))
1189 }
1190 return interceptor(ctx, in, info, handler)
1191 }
1192
1193 func _ACLService_BanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1194 in := new(BanPubkeyRequest)
1195 if err := dec(in); err != nil {
1196 return nil, err
1197 }
1198 if interceptor == nil {
1199 return srv.(ACLServiceServer).BanPubkey(ctx, in)
1200 }
1201 info := &grpc.UnaryServerInfo{
1202 Server: srv,
1203 FullMethod: ACLService_BanPubkey_FullMethodName,
1204 }
1205 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1206 return srv.(ACLServiceServer).BanPubkey(ctx, req.(*BanPubkeyRequest))
1207 }
1208 return interceptor(ctx, in, info, handler)
1209 }
1210
1211 func _ACLService_UnbanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1212 in := new(PubkeyRequest)
1213 if err := dec(in); err != nil {
1214 return nil, err
1215 }
1216 if interceptor == nil {
1217 return srv.(ACLServiceServer).UnbanPubkey(ctx, in)
1218 }
1219 info := &grpc.UnaryServerInfo{
1220 Server: srv,
1221 FullMethod: ACLService_UnbanPubkey_FullMethodName,
1222 }
1223 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1224 return srv.(ACLServiceServer).UnbanPubkey(ctx, req.(*PubkeyRequest))
1225 }
1226 return interceptor(ctx, in, info, handler)
1227 }
1228
1229 func _ACLService_ListBannedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1230 in := new(Empty)
1231 if err := dec(in); err != nil {
1232 return nil, err
1233 }
1234 if interceptor == nil {
1235 return srv.(ACLServiceServer).ListBannedPubkeys(ctx, in)
1236 }
1237 info := &grpc.UnaryServerInfo{
1238 Server: srv,
1239 FullMethod: ACLService_ListBannedPubkeys_FullMethodName,
1240 }
1241 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1242 return srv.(ACLServiceServer).ListBannedPubkeys(ctx, req.(*Empty))
1243 }
1244 return interceptor(ctx, in, info, handler)
1245 }
1246
1247 func _ACLService_AllowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1248 in := new(AllowPubkeyRequest)
1249 if err := dec(in); err != nil {
1250 return nil, err
1251 }
1252 if interceptor == nil {
1253 return srv.(ACLServiceServer).AllowPubkey(ctx, in)
1254 }
1255 info := &grpc.UnaryServerInfo{
1256 Server: srv,
1257 FullMethod: ACLService_AllowPubkey_FullMethodName,
1258 }
1259 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1260 return srv.(ACLServiceServer).AllowPubkey(ctx, req.(*AllowPubkeyRequest))
1261 }
1262 return interceptor(ctx, in, info, handler)
1263 }
1264
1265 func _ACLService_DisallowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1266 in := new(PubkeyRequest)
1267 if err := dec(in); err != nil {
1268 return nil, err
1269 }
1270 if interceptor == nil {
1271 return srv.(ACLServiceServer).DisallowPubkey(ctx, in)
1272 }
1273 info := &grpc.UnaryServerInfo{
1274 Server: srv,
1275 FullMethod: ACLService_DisallowPubkey_FullMethodName,
1276 }
1277 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1278 return srv.(ACLServiceServer).DisallowPubkey(ctx, req.(*PubkeyRequest))
1279 }
1280 return interceptor(ctx, in, info, handler)
1281 }
1282
1283 func _ACLService_ListAllowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1284 in := new(Empty)
1285 if err := dec(in); err != nil {
1286 return nil, err
1287 }
1288 if interceptor == nil {
1289 return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, in)
1290 }
1291 info := &grpc.UnaryServerInfo{
1292 Server: srv,
1293 FullMethod: ACLService_ListAllowedPubkeys_FullMethodName,
1294 }
1295 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1296 return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, req.(*Empty))
1297 }
1298 return interceptor(ctx, in, info, handler)
1299 }
1300
1301 func _ACLService_BanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1302 in := new(BanEventRequest)
1303 if err := dec(in); err != nil {
1304 return nil, err
1305 }
1306 if interceptor == nil {
1307 return srv.(ACLServiceServer).BanEvent(ctx, in)
1308 }
1309 info := &grpc.UnaryServerInfo{
1310 Server: srv,
1311 FullMethod: ACLService_BanEvent_FullMethodName,
1312 }
1313 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1314 return srv.(ACLServiceServer).BanEvent(ctx, req.(*BanEventRequest))
1315 }
1316 return interceptor(ctx, in, info, handler)
1317 }
1318
1319 func _ACLService_UnbanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1320 in := new(EventRequest)
1321 if err := dec(in); err != nil {
1322 return nil, err
1323 }
1324 if interceptor == nil {
1325 return srv.(ACLServiceServer).UnbanEvent(ctx, in)
1326 }
1327 info := &grpc.UnaryServerInfo{
1328 Server: srv,
1329 FullMethod: ACLService_UnbanEvent_FullMethodName,
1330 }
1331 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1332 return srv.(ACLServiceServer).UnbanEvent(ctx, req.(*EventRequest))
1333 }
1334 return interceptor(ctx, in, info, handler)
1335 }
1336
1337 func _ACLService_ListBannedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1338 in := new(Empty)
1339 if err := dec(in); err != nil {
1340 return nil, err
1341 }
1342 if interceptor == nil {
1343 return srv.(ACLServiceServer).ListBannedEvents(ctx, in)
1344 }
1345 info := &grpc.UnaryServerInfo{
1346 Server: srv,
1347 FullMethod: ACLService_ListBannedEvents_FullMethodName,
1348 }
1349 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1350 return srv.(ACLServiceServer).ListBannedEvents(ctx, req.(*Empty))
1351 }
1352 return interceptor(ctx, in, info, handler)
1353 }
1354
1355 func _ACLService_AllowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1356 in := new(BanEventRequest)
1357 if err := dec(in); err != nil {
1358 return nil, err
1359 }
1360 if interceptor == nil {
1361 return srv.(ACLServiceServer).AllowEvent(ctx, in)
1362 }
1363 info := &grpc.UnaryServerInfo{
1364 Server: srv,
1365 FullMethod: ACLService_AllowEvent_FullMethodName,
1366 }
1367 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1368 return srv.(ACLServiceServer).AllowEvent(ctx, req.(*BanEventRequest))
1369 }
1370 return interceptor(ctx, in, info, handler)
1371 }
1372
1373 func _ACLService_DisallowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1374 in := new(EventRequest)
1375 if err := dec(in); err != nil {
1376 return nil, err
1377 }
1378 if interceptor == nil {
1379 return srv.(ACLServiceServer).DisallowEvent(ctx, in)
1380 }
1381 info := &grpc.UnaryServerInfo{
1382 Server: srv,
1383 FullMethod: ACLService_DisallowEvent_FullMethodName,
1384 }
1385 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1386 return srv.(ACLServiceServer).DisallowEvent(ctx, req.(*EventRequest))
1387 }
1388 return interceptor(ctx, in, info, handler)
1389 }
1390
1391 func _ACLService_ListAllowedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1392 in := new(Empty)
1393 if err := dec(in); err != nil {
1394 return nil, err
1395 }
1396 if interceptor == nil {
1397 return srv.(ACLServiceServer).ListAllowedEvents(ctx, in)
1398 }
1399 info := &grpc.UnaryServerInfo{
1400 Server: srv,
1401 FullMethod: ACLService_ListAllowedEvents_FullMethodName,
1402 }
1403 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1404 return srv.(ACLServiceServer).ListAllowedEvents(ctx, req.(*Empty))
1405 }
1406 return interceptor(ctx, in, info, handler)
1407 }
1408
1409 func _ACLService_BlockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1410 in := new(BlockIPRequest)
1411 if err := dec(in); err != nil {
1412 return nil, err
1413 }
1414 if interceptor == nil {
1415 return srv.(ACLServiceServer).BlockIP(ctx, in)
1416 }
1417 info := &grpc.UnaryServerInfo{
1418 Server: srv,
1419 FullMethod: ACLService_BlockIP_FullMethodName,
1420 }
1421 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1422 return srv.(ACLServiceServer).BlockIP(ctx, req.(*BlockIPRequest))
1423 }
1424 return interceptor(ctx, in, info, handler)
1425 }
1426
1427 func _ACLService_UnblockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1428 in := new(IPRequest)
1429 if err := dec(in); err != nil {
1430 return nil, err
1431 }
1432 if interceptor == nil {
1433 return srv.(ACLServiceServer).UnblockIP(ctx, in)
1434 }
1435 info := &grpc.UnaryServerInfo{
1436 Server: srv,
1437 FullMethod: ACLService_UnblockIP_FullMethodName,
1438 }
1439 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1440 return srv.(ACLServiceServer).UnblockIP(ctx, req.(*IPRequest))
1441 }
1442 return interceptor(ctx, in, info, handler)
1443 }
1444
1445 func _ACLService_ListBlockedIPs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1446 in := new(Empty)
1447 if err := dec(in); err != nil {
1448 return nil, err
1449 }
1450 if interceptor == nil {
1451 return srv.(ACLServiceServer).ListBlockedIPs(ctx, in)
1452 }
1453 info := &grpc.UnaryServerInfo{
1454 Server: srv,
1455 FullMethod: ACLService_ListBlockedIPs_FullMethodName,
1456 }
1457 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1458 return srv.(ACLServiceServer).ListBlockedIPs(ctx, req.(*Empty))
1459 }
1460 return interceptor(ctx, in, info, handler)
1461 }
1462
1463 func _ACLService_AllowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1464 in := new(AllowKindRequest)
1465 if err := dec(in); err != nil {
1466 return nil, err
1467 }
1468 if interceptor == nil {
1469 return srv.(ACLServiceServer).AllowKind(ctx, in)
1470 }
1471 info := &grpc.UnaryServerInfo{
1472 Server: srv,
1473 FullMethod: ACLService_AllowKind_FullMethodName,
1474 }
1475 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1476 return srv.(ACLServiceServer).AllowKind(ctx, req.(*AllowKindRequest))
1477 }
1478 return interceptor(ctx, in, info, handler)
1479 }
1480
1481 func _ACLService_DisallowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1482 in := new(KindRequest)
1483 if err := dec(in); err != nil {
1484 return nil, err
1485 }
1486 if interceptor == nil {
1487 return srv.(ACLServiceServer).DisallowKind(ctx, in)
1488 }
1489 info := &grpc.UnaryServerInfo{
1490 Server: srv,
1491 FullMethod: ACLService_DisallowKind_FullMethodName,
1492 }
1493 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1494 return srv.(ACLServiceServer).DisallowKind(ctx, req.(*KindRequest))
1495 }
1496 return interceptor(ctx, in, info, handler)
1497 }
1498
1499 func _ACLService_ListAllowedKinds_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1500 in := new(Empty)
1501 if err := dec(in); err != nil {
1502 return nil, err
1503 }
1504 if interceptor == nil {
1505 return srv.(ACLServiceServer).ListAllowedKinds(ctx, in)
1506 }
1507 info := &grpc.UnaryServerInfo{
1508 Server: srv,
1509 FullMethod: ACLService_ListAllowedKinds_FullMethodName,
1510 }
1511 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1512 return srv.(ACLServiceServer).ListAllowedKinds(ctx, req.(*Empty))
1513 }
1514 return interceptor(ctx, in, info, handler)
1515 }
1516
1517 func _ACLService_UpdatePeerAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1518 in := new(UpdatePeerAdminsRequest)
1519 if err := dec(in); err != nil {
1520 return nil, err
1521 }
1522 if interceptor == nil {
1523 return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, in)
1524 }
1525 info := &grpc.UnaryServerInfo{
1526 Server: srv,
1527 FullMethod: ACLService_UpdatePeerAdmins_FullMethodName,
1528 }
1529 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1530 return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, req.(*UpdatePeerAdminsRequest))
1531 }
1532 return interceptor(ctx, in, info, handler)
1533 }
1534
1535 func _ACLService_TrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1536 in := new(TrustPubkeyRequest)
1537 if err := dec(in); err != nil {
1538 return nil, err
1539 }
1540 if interceptor == nil {
1541 return srv.(ACLServiceServer).TrustPubkey(ctx, in)
1542 }
1543 info := &grpc.UnaryServerInfo{
1544 Server: srv,
1545 FullMethod: ACLService_TrustPubkey_FullMethodName,
1546 }
1547 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1548 return srv.(ACLServiceServer).TrustPubkey(ctx, req.(*TrustPubkeyRequest))
1549 }
1550 return interceptor(ctx, in, info, handler)
1551 }
1552
1553 func _ACLService_UntrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1554 in := new(PubkeyRequest)
1555 if err := dec(in); err != nil {
1556 return nil, err
1557 }
1558 if interceptor == nil {
1559 return srv.(ACLServiceServer).UntrustPubkey(ctx, in)
1560 }
1561 info := &grpc.UnaryServerInfo{
1562 Server: srv,
1563 FullMethod: ACLService_UntrustPubkey_FullMethodName,
1564 }
1565 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1566 return srv.(ACLServiceServer).UntrustPubkey(ctx, req.(*PubkeyRequest))
1567 }
1568 return interceptor(ctx, in, info, handler)
1569 }
1570
1571 func _ACLService_ListTrustedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1572 in := new(Empty)
1573 if err := dec(in); err != nil {
1574 return nil, err
1575 }
1576 if interceptor == nil {
1577 return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, in)
1578 }
1579 info := &grpc.UnaryServerInfo{
1580 Server: srv,
1581 FullMethod: ACLService_ListTrustedPubkeys_FullMethodName,
1582 }
1583 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1584 return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, req.(*Empty))
1585 }
1586 return interceptor(ctx, in, info, handler)
1587 }
1588
1589 func _ACLService_BlacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1590 in := new(BlacklistPubkeyRequest)
1591 if err := dec(in); err != nil {
1592 return nil, err
1593 }
1594 if interceptor == nil {
1595 return srv.(ACLServiceServer).BlacklistPubkey(ctx, in)
1596 }
1597 info := &grpc.UnaryServerInfo{
1598 Server: srv,
1599 FullMethod: ACLService_BlacklistPubkey_FullMethodName,
1600 }
1601 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1602 return srv.(ACLServiceServer).BlacklistPubkey(ctx, req.(*BlacklistPubkeyRequest))
1603 }
1604 return interceptor(ctx, in, info, handler)
1605 }
1606
1607 func _ACLService_UnblacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1608 in := new(PubkeyRequest)
1609 if err := dec(in); err != nil {
1610 return nil, err
1611 }
1612 if interceptor == nil {
1613 return srv.(ACLServiceServer).UnblacklistPubkey(ctx, in)
1614 }
1615 info := &grpc.UnaryServerInfo{
1616 Server: srv,
1617 FullMethod: ACLService_UnblacklistPubkey_FullMethodName,
1618 }
1619 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1620 return srv.(ACLServiceServer).UnblacklistPubkey(ctx, req.(*PubkeyRequest))
1621 }
1622 return interceptor(ctx, in, info, handler)
1623 }
1624
1625 func _ACLService_ListBlacklistedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1626 in := new(Empty)
1627 if err := dec(in); err != nil {
1628 return nil, err
1629 }
1630 if interceptor == nil {
1631 return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, in)
1632 }
1633 info := &grpc.UnaryServerInfo{
1634 Server: srv,
1635 FullMethod: ACLService_ListBlacklistedPubkeys_FullMethodName,
1636 }
1637 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1638 return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, req.(*Empty))
1639 }
1640 return interceptor(ctx, in, info, handler)
1641 }
1642
1643 func _ACLService_MarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1644 in := new(MarkSpamRequest)
1645 if err := dec(in); err != nil {
1646 return nil, err
1647 }
1648 if interceptor == nil {
1649 return srv.(ACLServiceServer).MarkSpam(ctx, in)
1650 }
1651 info := &grpc.UnaryServerInfo{
1652 Server: srv,
1653 FullMethod: ACLService_MarkSpam_FullMethodName,
1654 }
1655 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1656 return srv.(ACLServiceServer).MarkSpam(ctx, req.(*MarkSpamRequest))
1657 }
1658 return interceptor(ctx, in, info, handler)
1659 }
1660
1661 func _ACLService_UnmarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1662 in := new(EventRequest)
1663 if err := dec(in); err != nil {
1664 return nil, err
1665 }
1666 if interceptor == nil {
1667 return srv.(ACLServiceServer).UnmarkSpam(ctx, in)
1668 }
1669 info := &grpc.UnaryServerInfo{
1670 Server: srv,
1671 FullMethod: ACLService_UnmarkSpam_FullMethodName,
1672 }
1673 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1674 return srv.(ACLServiceServer).UnmarkSpam(ctx, req.(*EventRequest))
1675 }
1676 return interceptor(ctx, in, info, handler)
1677 }
1678
1679 func _ACLService_ListSpamEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1680 in := new(Empty)
1681 if err := dec(in); err != nil {
1682 return nil, err
1683 }
1684 if interceptor == nil {
1685 return srv.(ACLServiceServer).ListSpamEvents(ctx, in)
1686 }
1687 info := &grpc.UnaryServerInfo{
1688 Server: srv,
1689 FullMethod: ACLService_ListSpamEvents_FullMethodName,
1690 }
1691 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1692 return srv.(ACLServiceServer).ListSpamEvents(ctx, req.(*Empty))
1693 }
1694 return interceptor(ctx, in, info, handler)
1695 }
1696
1697 func _ACLService_RateLimitCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1698 in := new(RateLimitCheckRequest)
1699 if err := dec(in); err != nil {
1700 return nil, err
1701 }
1702 if interceptor == nil {
1703 return srv.(ACLServiceServer).RateLimitCheck(ctx, in)
1704 }
1705 info := &grpc.UnaryServerInfo{
1706 Server: srv,
1707 FullMethod: ACLService_RateLimitCheck_FullMethodName,
1708 }
1709 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1710 return srv.(ACLServiceServer).RateLimitCheck(ctx, req.(*RateLimitCheckRequest))
1711 }
1712 return interceptor(ctx, in, info, handler)
1713 }
1714
1715 func _ACLService_ProcessConfigEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1716 in := new(ConfigEventRequest)
1717 if err := dec(in); err != nil {
1718 return nil, err
1719 }
1720 if interceptor == nil {
1721 return srv.(ACLServiceServer).ProcessConfigEvent(ctx, in)
1722 }
1723 info := &grpc.UnaryServerInfo{
1724 Server: srv,
1725 FullMethod: ACLService_ProcessConfigEvent_FullMethodName,
1726 }
1727 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1728 return srv.(ACLServiceServer).ProcessConfigEvent(ctx, req.(*ConfigEventRequest))
1729 }
1730 return interceptor(ctx, in, info, handler)
1731 }
1732
1733 func _ACLService_GetCuratingConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1734 in := new(Empty)
1735 if err := dec(in); err != nil {
1736 return nil, err
1737 }
1738 if interceptor == nil {
1739 return srv.(ACLServiceServer).GetCuratingConfig(ctx, in)
1740 }
1741 info := &grpc.UnaryServerInfo{
1742 Server: srv,
1743 FullMethod: ACLService_GetCuratingConfig_FullMethodName,
1744 }
1745 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1746 return srv.(ACLServiceServer).GetCuratingConfig(ctx, req.(*Empty))
1747 }
1748 return interceptor(ctx, in, info, handler)
1749 }
1750
1751 func _ACLService_IsCuratingConfigured_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1752 in := new(Empty)
1753 if err := dec(in); err != nil {
1754 return nil, err
1755 }
1756 if interceptor == nil {
1757 return srv.(ACLServiceServer).IsCuratingConfigured(ctx, in)
1758 }
1759 info := &grpc.UnaryServerInfo{
1760 Server: srv,
1761 FullMethod: ACLService_IsCuratingConfigured_FullMethodName,
1762 }
1763 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1764 return srv.(ACLServiceServer).IsCuratingConfigured(ctx, req.(*Empty))
1765 }
1766 return interceptor(ctx, in, info, handler)
1767 }
1768
1769 func _ACLService_ListUnclassifiedUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1770 in := new(PaginationRequest)
1771 if err := dec(in); err != nil {
1772 return nil, err
1773 }
1774 if interceptor == nil {
1775 return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, in)
1776 }
1777 info := &grpc.UnaryServerInfo{
1778 Server: srv,
1779 FullMethod: ACLService_ListUnclassifiedUsers_FullMethodName,
1780 }
1781 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1782 return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, req.(*PaginationRequest))
1783 }
1784 return interceptor(ctx, in, info, handler)
1785 }
1786
1787 func _ACLService_GetEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1788 in := new(GetEventsForPubkeyRequest)
1789 if err := dec(in); err != nil {
1790 return nil, err
1791 }
1792 if interceptor == nil {
1793 return srv.(ACLServiceServer).GetEventsForPubkey(ctx, in)
1794 }
1795 info := &grpc.UnaryServerInfo{
1796 Server: srv,
1797 FullMethod: ACLService_GetEventsForPubkey_FullMethodName,
1798 }
1799 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1800 return srv.(ACLServiceServer).GetEventsForPubkey(ctx, req.(*GetEventsForPubkeyRequest))
1801 }
1802 return interceptor(ctx, in, info, handler)
1803 }
1804
1805 func _ACLService_DeleteEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1806 in := new(DeleteEventsForPubkeyRequest)
1807 if err := dec(in); err != nil {
1808 return nil, err
1809 }
1810 if interceptor == nil {
1811 return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, in)
1812 }
1813 info := &grpc.UnaryServerInfo{
1814 Server: srv,
1815 FullMethod: ACLService_DeleteEventsForPubkey_FullMethodName,
1816 }
1817 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1818 return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, req.(*DeleteEventsForPubkeyRequest))
1819 }
1820 return interceptor(ctx, in, info, handler)
1821 }
1822
1823 func _ACLService_ScanAllPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1824 in := new(Empty)
1825 if err := dec(in); err != nil {
1826 return nil, err
1827 }
1828 if interceptor == nil {
1829 return srv.(ACLServiceServer).ScanAllPubkeys(ctx, in)
1830 }
1831 info := &grpc.UnaryServerInfo{
1832 Server: srv,
1833 FullMethod: ACLService_ScanAllPubkeys_FullMethodName,
1834 }
1835 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1836 return srv.(ACLServiceServer).ScanAllPubkeys(ctx, req.(*Empty))
1837 }
1838 return interceptor(ctx, in, info, handler)
1839 }
1840
1841 func _ACLService_SubscribePubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1842 in := new(SubscribeRequest)
1843 if err := dec(in); err != nil {
1844 return nil, err
1845 }
1846 if interceptor == nil {
1847 return srv.(ACLServiceServer).SubscribePubkey(ctx, in)
1848 }
1849 info := &grpc.UnaryServerInfo{
1850 Server: srv,
1851 FullMethod: ACLService_SubscribePubkey_FullMethodName,
1852 }
1853 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1854 return srv.(ACLServiceServer).SubscribePubkey(ctx, req.(*SubscribeRequest))
1855 }
1856 return interceptor(ctx, in, info, handler)
1857 }
1858
1859 func _ACLService_UnsubscribePubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1860 in := new(PubkeyRequest)
1861 if err := dec(in); err != nil {
1862 return nil, err
1863 }
1864 if interceptor == nil {
1865 return srv.(ACLServiceServer).UnsubscribePubkey(ctx, in)
1866 }
1867 info := &grpc.UnaryServerInfo{
1868 Server: srv,
1869 FullMethod: ACLService_UnsubscribePubkey_FullMethodName,
1870 }
1871 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1872 return srv.(ACLServiceServer).UnsubscribePubkey(ctx, req.(*PubkeyRequest))
1873 }
1874 return interceptor(ctx, in, info, handler)
1875 }
1876
1877 func _ACLService_IsSubscribed_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1878 in := new(PubkeyRequest)
1879 if err := dec(in); err != nil {
1880 return nil, err
1881 }
1882 if interceptor == nil {
1883 return srv.(ACLServiceServer).IsSubscribed(ctx, in)
1884 }
1885 info := &grpc.UnaryServerInfo{
1886 Server: srv,
1887 FullMethod: ACLService_IsSubscribed_FullMethodName,
1888 }
1889 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1890 return srv.(ACLServiceServer).IsSubscribed(ctx, req.(*PubkeyRequest))
1891 }
1892 return interceptor(ctx, in, info, handler)
1893 }
1894
1895 func _ACLService_GetSubscription_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1896 in := new(PubkeyRequest)
1897 if err := dec(in); err != nil {
1898 return nil, err
1899 }
1900 if interceptor == nil {
1901 return srv.(ACLServiceServer).GetSubscription(ctx, in)
1902 }
1903 info := &grpc.UnaryServerInfo{
1904 Server: srv,
1905 FullMethod: ACLService_GetSubscription_FullMethodName,
1906 }
1907 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1908 return srv.(ACLServiceServer).GetSubscription(ctx, req.(*PubkeyRequest))
1909 }
1910 return interceptor(ctx, in, info, handler)
1911 }
1912
1913 func _ACLService_ClaimAlias_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1914 in := new(ClaimAliasRequest)
1915 if err := dec(in); err != nil {
1916 return nil, err
1917 }
1918 if interceptor == nil {
1919 return srv.(ACLServiceServer).ClaimAlias(ctx, in)
1920 }
1921 info := &grpc.UnaryServerInfo{
1922 Server: srv,
1923 FullMethod: ACLService_ClaimAlias_FullMethodName,
1924 }
1925 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1926 return srv.(ACLServiceServer).ClaimAlias(ctx, req.(*ClaimAliasRequest))
1927 }
1928 return interceptor(ctx, in, info, handler)
1929 }
1930
1931 func _ACLService_GetAliasByPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1932 in := new(PubkeyRequest)
1933 if err := dec(in); err != nil {
1934 return nil, err
1935 }
1936 if interceptor == nil {
1937 return srv.(ACLServiceServer).GetAliasByPubkey(ctx, in)
1938 }
1939 info := &grpc.UnaryServerInfo{
1940 Server: srv,
1941 FullMethod: ACLService_GetAliasByPubkey_FullMethodName,
1942 }
1943 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1944 return srv.(ACLServiceServer).GetAliasByPubkey(ctx, req.(*PubkeyRequest))
1945 }
1946 return interceptor(ctx, in, info, handler)
1947 }
1948
1949 func _ACLService_GetPubkeyByAlias_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1950 in := new(AliasRequest)
1951 if err := dec(in); err != nil {
1952 return nil, err
1953 }
1954 if interceptor == nil {
1955 return srv.(ACLServiceServer).GetPubkeyByAlias(ctx, in)
1956 }
1957 info := &grpc.UnaryServerInfo{
1958 Server: srv,
1959 FullMethod: ACLService_GetPubkeyByAlias_FullMethodName,
1960 }
1961 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1962 return srv.(ACLServiceServer).GetPubkeyByAlias(ctx, req.(*AliasRequest))
1963 }
1964 return interceptor(ctx, in, info, handler)
1965 }
1966
1967 func _ACLService_IsAliasTaken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1968 in := new(AliasRequest)
1969 if err := dec(in); err != nil {
1970 return nil, err
1971 }
1972 if interceptor == nil {
1973 return srv.(ACLServiceServer).IsAliasTaken(ctx, in)
1974 }
1975 info := &grpc.UnaryServerInfo{
1976 Server: srv,
1977 FullMethod: ACLService_IsAliasTaken_FullMethodName,
1978 }
1979 handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1980 return srv.(ACLServiceServer).IsAliasTaken(ctx, req.(*AliasRequest))
1981 }
1982 return interceptor(ctx, in, info, handler)
1983 }
1984
1985 // ACLService_ServiceDesc is the grpc.ServiceDesc for ACLService service.
1986 // It's only intended for direct use with grpc.RegisterService,
1987 // and not to be introspected or modified (even as a copy)
1988 var ACLService_ServiceDesc = grpc.ServiceDesc{
1989 ServiceName: "orlyacl.v1.ACLService",
1990 HandlerType: (*ACLServiceServer)(nil),
1991 Methods: []grpc.MethodDesc{
1992 {
1993 MethodName: "GetAccessLevel",
1994 Handler: _ACLService_GetAccessLevel_Handler,
1995 },
1996 {
1997 MethodName: "CheckPolicy",
1998 Handler: _ACLService_CheckPolicy_Handler,
1999 },
2000 {
2001 MethodName: "GetACLInfo",
2002 Handler: _ACLService_GetACLInfo_Handler,
2003 },
2004 {
2005 MethodName: "GetMode",
2006 Handler: _ACLService_GetMode_Handler,
2007 },
2008 {
2009 MethodName: "Ready",
2010 Handler: _ACLService_Ready_Handler,
2011 },
2012 {
2013 MethodName: "GetThrottleDelay",
2014 Handler: _ACLService_GetThrottleDelay_Handler,
2015 },
2016 {
2017 MethodName: "AddFollow",
2018 Handler: _ACLService_AddFollow_Handler,
2019 },
2020 {
2021 MethodName: "GetFollowedPubkeys",
2022 Handler: _ACLService_GetFollowedPubkeys_Handler,
2023 },
2024 {
2025 MethodName: "GetAdminRelays",
2026 Handler: _ACLService_GetAdminRelays_Handler,
2027 },
2028 {
2029 MethodName: "BanPubkey",
2030 Handler: _ACLService_BanPubkey_Handler,
2031 },
2032 {
2033 MethodName: "UnbanPubkey",
2034 Handler: _ACLService_UnbanPubkey_Handler,
2035 },
2036 {
2037 MethodName: "ListBannedPubkeys",
2038 Handler: _ACLService_ListBannedPubkeys_Handler,
2039 },
2040 {
2041 MethodName: "AllowPubkey",
2042 Handler: _ACLService_AllowPubkey_Handler,
2043 },
2044 {
2045 MethodName: "DisallowPubkey",
2046 Handler: _ACLService_DisallowPubkey_Handler,
2047 },
2048 {
2049 MethodName: "ListAllowedPubkeys",
2050 Handler: _ACLService_ListAllowedPubkeys_Handler,
2051 },
2052 {
2053 MethodName: "BanEvent",
2054 Handler: _ACLService_BanEvent_Handler,
2055 },
2056 {
2057 MethodName: "UnbanEvent",
2058 Handler: _ACLService_UnbanEvent_Handler,
2059 },
2060 {
2061 MethodName: "ListBannedEvents",
2062 Handler: _ACLService_ListBannedEvents_Handler,
2063 },
2064 {
2065 MethodName: "AllowEvent",
2066 Handler: _ACLService_AllowEvent_Handler,
2067 },
2068 {
2069 MethodName: "DisallowEvent",
2070 Handler: _ACLService_DisallowEvent_Handler,
2071 },
2072 {
2073 MethodName: "ListAllowedEvents",
2074 Handler: _ACLService_ListAllowedEvents_Handler,
2075 },
2076 {
2077 MethodName: "BlockIP",
2078 Handler: _ACLService_BlockIP_Handler,
2079 },
2080 {
2081 MethodName: "UnblockIP",
2082 Handler: _ACLService_UnblockIP_Handler,
2083 },
2084 {
2085 MethodName: "ListBlockedIPs",
2086 Handler: _ACLService_ListBlockedIPs_Handler,
2087 },
2088 {
2089 MethodName: "AllowKind",
2090 Handler: _ACLService_AllowKind_Handler,
2091 },
2092 {
2093 MethodName: "DisallowKind",
2094 Handler: _ACLService_DisallowKind_Handler,
2095 },
2096 {
2097 MethodName: "ListAllowedKinds",
2098 Handler: _ACLService_ListAllowedKinds_Handler,
2099 },
2100 {
2101 MethodName: "UpdatePeerAdmins",
2102 Handler: _ACLService_UpdatePeerAdmins_Handler,
2103 },
2104 {
2105 MethodName: "TrustPubkey",
2106 Handler: _ACLService_TrustPubkey_Handler,
2107 },
2108 {
2109 MethodName: "UntrustPubkey",
2110 Handler: _ACLService_UntrustPubkey_Handler,
2111 },
2112 {
2113 MethodName: "ListTrustedPubkeys",
2114 Handler: _ACLService_ListTrustedPubkeys_Handler,
2115 },
2116 {
2117 MethodName: "BlacklistPubkey",
2118 Handler: _ACLService_BlacklistPubkey_Handler,
2119 },
2120 {
2121 MethodName: "UnblacklistPubkey",
2122 Handler: _ACLService_UnblacklistPubkey_Handler,
2123 },
2124 {
2125 MethodName: "ListBlacklistedPubkeys",
2126 Handler: _ACLService_ListBlacklistedPubkeys_Handler,
2127 },
2128 {
2129 MethodName: "MarkSpam",
2130 Handler: _ACLService_MarkSpam_Handler,
2131 },
2132 {
2133 MethodName: "UnmarkSpam",
2134 Handler: _ACLService_UnmarkSpam_Handler,
2135 },
2136 {
2137 MethodName: "ListSpamEvents",
2138 Handler: _ACLService_ListSpamEvents_Handler,
2139 },
2140 {
2141 MethodName: "RateLimitCheck",
2142 Handler: _ACLService_RateLimitCheck_Handler,
2143 },
2144 {
2145 MethodName: "ProcessConfigEvent",
2146 Handler: _ACLService_ProcessConfigEvent_Handler,
2147 },
2148 {
2149 MethodName: "GetCuratingConfig",
2150 Handler: _ACLService_GetCuratingConfig_Handler,
2151 },
2152 {
2153 MethodName: "IsCuratingConfigured",
2154 Handler: _ACLService_IsCuratingConfigured_Handler,
2155 },
2156 {
2157 MethodName: "ListUnclassifiedUsers",
2158 Handler: _ACLService_ListUnclassifiedUsers_Handler,
2159 },
2160 {
2161 MethodName: "GetEventsForPubkey",
2162 Handler: _ACLService_GetEventsForPubkey_Handler,
2163 },
2164 {
2165 MethodName: "DeleteEventsForPubkey",
2166 Handler: _ACLService_DeleteEventsForPubkey_Handler,
2167 },
2168 {
2169 MethodName: "ScanAllPubkeys",
2170 Handler: _ACLService_ScanAllPubkeys_Handler,
2171 },
2172 {
2173 MethodName: "SubscribePubkey",
2174 Handler: _ACLService_SubscribePubkey_Handler,
2175 },
2176 {
2177 MethodName: "UnsubscribePubkey",
2178 Handler: _ACLService_UnsubscribePubkey_Handler,
2179 },
2180 {
2181 MethodName: "IsSubscribed",
2182 Handler: _ACLService_IsSubscribed_Handler,
2183 },
2184 {
2185 MethodName: "GetSubscription",
2186 Handler: _ACLService_GetSubscription_Handler,
2187 },
2188 {
2189 MethodName: "ClaimAlias",
2190 Handler: _ACLService_ClaimAlias_Handler,
2191 },
2192 {
2193 MethodName: "GetAliasByPubkey",
2194 Handler: _ACLService_GetAliasByPubkey_Handler,
2195 },
2196 {
2197 MethodName: "GetPubkeyByAlias",
2198 Handler: _ACLService_GetPubkeyByAlias_Handler,
2199 },
2200 {
2201 MethodName: "IsAliasTaken",
2202 Handler: _ACLService_IsAliasTaken_Handler,
2203 },
2204 },
2205 Streams: []grpc.StreamDesc{},
2206 Metadata: "orlyacl/v1/acl.proto",
2207 }
2208