acl_grpc.pb.go raw

   1  // Code generated by protoc-gen-go-grpc. DO NOT EDIT.
   2  // versions:
   3  // - protoc-gen-go-grpc v1.6.0
   4  // - protoc             (unknown)
   5  // source: orlyacl/v1/acl.proto
   6  
   7  package orlyaclv1
   8  
   9  import (
  10  	context "context"
  11  	grpc "google.golang.org/grpc"
  12  	codes "google.golang.org/grpc/codes"
  13  	status "google.golang.org/grpc/status"
  14  )
  15  
  16  // This is a compile-time assertion to ensure that this generated file
  17  // is compatible with the grpc package it is being compiled against.
  18  // Requires gRPC-Go v1.64.0 or later.
  19  const _ = grpc.SupportPackageIsVersion9
  20  
  21  const (
  22  	ACLService_GetAccessLevel_FullMethodName         = "/orlyacl.v1.ACLService/GetAccessLevel"
  23  	ACLService_CheckPolicy_FullMethodName            = "/orlyacl.v1.ACLService/CheckPolicy"
  24  	ACLService_GetACLInfo_FullMethodName             = "/orlyacl.v1.ACLService/GetACLInfo"
  25  	ACLService_GetMode_FullMethodName                = "/orlyacl.v1.ACLService/GetMode"
  26  	ACLService_Ready_FullMethodName                  = "/orlyacl.v1.ACLService/Ready"
  27  	ACLService_GetThrottleDelay_FullMethodName       = "/orlyacl.v1.ACLService/GetThrottleDelay"
  28  	ACLService_AddFollow_FullMethodName              = "/orlyacl.v1.ACLService/AddFollow"
  29  	ACLService_GetFollowedPubkeys_FullMethodName     = "/orlyacl.v1.ACLService/GetFollowedPubkeys"
  30  	ACLService_GetAdminRelays_FullMethodName         = "/orlyacl.v1.ACLService/GetAdminRelays"
  31  	ACLService_BanPubkey_FullMethodName              = "/orlyacl.v1.ACLService/BanPubkey"
  32  	ACLService_UnbanPubkey_FullMethodName            = "/orlyacl.v1.ACLService/UnbanPubkey"
  33  	ACLService_ListBannedPubkeys_FullMethodName      = "/orlyacl.v1.ACLService/ListBannedPubkeys"
  34  	ACLService_AllowPubkey_FullMethodName            = "/orlyacl.v1.ACLService/AllowPubkey"
  35  	ACLService_DisallowPubkey_FullMethodName         = "/orlyacl.v1.ACLService/DisallowPubkey"
  36  	ACLService_ListAllowedPubkeys_FullMethodName     = "/orlyacl.v1.ACLService/ListAllowedPubkeys"
  37  	ACLService_BanEvent_FullMethodName               = "/orlyacl.v1.ACLService/BanEvent"
  38  	ACLService_UnbanEvent_FullMethodName             = "/orlyacl.v1.ACLService/UnbanEvent"
  39  	ACLService_ListBannedEvents_FullMethodName       = "/orlyacl.v1.ACLService/ListBannedEvents"
  40  	ACLService_AllowEvent_FullMethodName             = "/orlyacl.v1.ACLService/AllowEvent"
  41  	ACLService_DisallowEvent_FullMethodName          = "/orlyacl.v1.ACLService/DisallowEvent"
  42  	ACLService_ListAllowedEvents_FullMethodName      = "/orlyacl.v1.ACLService/ListAllowedEvents"
  43  	ACLService_BlockIP_FullMethodName                = "/orlyacl.v1.ACLService/BlockIP"
  44  	ACLService_UnblockIP_FullMethodName              = "/orlyacl.v1.ACLService/UnblockIP"
  45  	ACLService_ListBlockedIPs_FullMethodName         = "/orlyacl.v1.ACLService/ListBlockedIPs"
  46  	ACLService_AllowKind_FullMethodName              = "/orlyacl.v1.ACLService/AllowKind"
  47  	ACLService_DisallowKind_FullMethodName           = "/orlyacl.v1.ACLService/DisallowKind"
  48  	ACLService_ListAllowedKinds_FullMethodName       = "/orlyacl.v1.ACLService/ListAllowedKinds"
  49  	ACLService_UpdatePeerAdmins_FullMethodName       = "/orlyacl.v1.ACLService/UpdatePeerAdmins"
  50  	ACLService_TrustPubkey_FullMethodName            = "/orlyacl.v1.ACLService/TrustPubkey"
  51  	ACLService_UntrustPubkey_FullMethodName          = "/orlyacl.v1.ACLService/UntrustPubkey"
  52  	ACLService_ListTrustedPubkeys_FullMethodName     = "/orlyacl.v1.ACLService/ListTrustedPubkeys"
  53  	ACLService_BlacklistPubkey_FullMethodName        = "/orlyacl.v1.ACLService/BlacklistPubkey"
  54  	ACLService_UnblacklistPubkey_FullMethodName      = "/orlyacl.v1.ACLService/UnblacklistPubkey"
  55  	ACLService_ListBlacklistedPubkeys_FullMethodName = "/orlyacl.v1.ACLService/ListBlacklistedPubkeys"
  56  	ACLService_MarkSpam_FullMethodName               = "/orlyacl.v1.ACLService/MarkSpam"
  57  	ACLService_UnmarkSpam_FullMethodName             = "/orlyacl.v1.ACLService/UnmarkSpam"
  58  	ACLService_ListSpamEvents_FullMethodName         = "/orlyacl.v1.ACLService/ListSpamEvents"
  59  	ACLService_RateLimitCheck_FullMethodName         = "/orlyacl.v1.ACLService/RateLimitCheck"
  60  	ACLService_ProcessConfigEvent_FullMethodName     = "/orlyacl.v1.ACLService/ProcessConfigEvent"
  61  	ACLService_GetCuratingConfig_FullMethodName      = "/orlyacl.v1.ACLService/GetCuratingConfig"
  62  	ACLService_IsCuratingConfigured_FullMethodName   = "/orlyacl.v1.ACLService/IsCuratingConfigured"
  63  	ACLService_ListUnclassifiedUsers_FullMethodName  = "/orlyacl.v1.ACLService/ListUnclassifiedUsers"
  64  	ACLService_GetEventsForPubkey_FullMethodName     = "/orlyacl.v1.ACLService/GetEventsForPubkey"
  65  	ACLService_DeleteEventsForPubkey_FullMethodName  = "/orlyacl.v1.ACLService/DeleteEventsForPubkey"
  66  	ACLService_ScanAllPubkeys_FullMethodName         = "/orlyacl.v1.ACLService/ScanAllPubkeys"
  67  	ACLService_SubscribePubkey_FullMethodName        = "/orlyacl.v1.ACLService/SubscribePubkey"
  68  	ACLService_UnsubscribePubkey_FullMethodName      = "/orlyacl.v1.ACLService/UnsubscribePubkey"
  69  	ACLService_IsSubscribed_FullMethodName           = "/orlyacl.v1.ACLService/IsSubscribed"
  70  	ACLService_GetSubscription_FullMethodName        = "/orlyacl.v1.ACLService/GetSubscription"
  71  	ACLService_ClaimAlias_FullMethodName             = "/orlyacl.v1.ACLService/ClaimAlias"
  72  	ACLService_GetAliasByPubkey_FullMethodName       = "/orlyacl.v1.ACLService/GetAliasByPubkey"
  73  	ACLService_GetPubkeyByAlias_FullMethodName       = "/orlyacl.v1.ACLService/GetPubkeyByAlias"
  74  	ACLService_IsAliasTaken_FullMethodName           = "/orlyacl.v1.ACLService/IsAliasTaken"
  75  )
  76  
  77  // ACLServiceClient is the client API for ACLService service.
  78  //
  79  // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
  80  //
  81  // ACLService provides access control operations for the Nostr relay
  82  type ACLServiceClient interface {
  83  	// GetAccessLevel returns the access level for a pubkey from an IP address
  84  	GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error)
  85  	// CheckPolicy checks if an event passes policy checks
  86  	CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error)
  87  	// GetACLInfo returns information about the active ACL mode
  88  	GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error)
  89  	// GetMode returns the current ACL mode (none/follows/managed/curating)
  90  	GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error)
  91  	// Ready checks if the ACL service is ready
  92  	Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error)
  93  	// GetThrottleDelay returns the progressive throttle delay for a pubkey
  94  	GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error)
  95  	// AddFollow adds a pubkey to the followed list
  96  	AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error)
  97  	// GetFollowedPubkeys returns all followed pubkeys
  98  	GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error)
  99  	// GetAdminRelays returns the relay URLs from admin kind 10002 events
 100  	GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error)
 101  	// BanPubkey adds a pubkey to the ban list
 102  	BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 103  	// UnbanPubkey removes a pubkey from the ban list
 104  	UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 105  	// ListBannedPubkeys returns all banned pubkeys
 106  	ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error)
 107  	// AllowPubkey adds a pubkey to the allow list
 108  	AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 109  	// DisallowPubkey removes a pubkey from the allow list
 110  	DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 111  	// ListAllowedPubkeys returns all explicitly allowed pubkeys
 112  	ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error)
 113  	// BanEvent adds an event to the ban list
 114  	BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
 115  	// UnbanEvent removes an event from the ban list
 116  	UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
 117  	// ListBannedEvents returns all banned events
 118  	ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error)
 119  	// AllowEvent adds an event to the allow list
 120  	AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error)
 121  	// DisallowEvent removes an event from the allow list
 122  	DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
 123  	// ListAllowedEvents returns all explicitly allowed events
 124  	ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error)
 125  	// BlockIP adds an IP to the block list
 126  	BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error)
 127  	// UnblockIP removes an IP from the block list
 128  	UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error)
 129  	// ListBlockedIPs returns all blocked IPs
 130  	ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error)
 131  	// AllowKind adds a kind to the allow list
 132  	AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error)
 133  	// DisallowKind removes a kind from the allow list
 134  	DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error)
 135  	// ListAllowedKinds returns all allowed kinds
 136  	ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error)
 137  	// UpdatePeerAdmins updates the peer relay identity pubkeys
 138  	UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error)
 139  	// TrustPubkey adds a pubkey to the trusted list
 140  	TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 141  	// UntrustPubkey removes a pubkey from the trusted list
 142  	UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 143  	// ListTrustedPubkeys returns all trusted pubkeys
 144  	ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error)
 145  	// BlacklistPubkey adds a pubkey to the blacklist
 146  	BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 147  	// UnblacklistPubkey removes a pubkey from the blacklist
 148  	UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 149  	// ListBlacklistedPubkeys returns all blacklisted pubkeys
 150  	ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error)
 151  	// MarkSpam marks an event as spam
 152  	MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error)
 153  	// UnmarkSpam removes the spam flag from an event
 154  	UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error)
 155  	// ListSpamEvents returns all spam-flagged events
 156  	ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error)
 157  	// RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
 158  	RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error)
 159  	// ProcessConfigEvent processes a curating config event (kind 30078)
 160  	ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error)
 161  	// GetCuratingConfig returns the current curating configuration
 162  	GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error)
 163  	// IsCuratingConfigured checks if curating mode is configured
 164  	IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error)
 165  	// ListUnclassifiedUsers returns users who are not trusted or blacklisted
 166  	ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error)
 167  	// GetEventsForPubkey returns events for a specific pubkey
 168  	GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error)
 169  	// DeleteEventsForPubkey deletes all events for a pubkey
 170  	DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error)
 171  	// ScanAllPubkeys scans and indexes all pubkeys in the database
 172  	ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error)
 173  	// SubscribePubkey activates a subscription for a pubkey
 174  	SubscribePubkey(ctx context.Context, in *SubscribeRequest, opts ...grpc.CallOption) (*Empty, error)
 175  	// UnsubscribePubkey removes a subscription
 176  	UnsubscribePubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error)
 177  	// IsSubscribed checks if a pubkey has an active subscription
 178  	IsSubscribed(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*BoolResponse, error)
 179  	// GetSubscription returns subscription details for a pubkey
 180  	GetSubscription(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*SubscriptionResponse, error)
 181  	// ClaimAlias claims an email alias for a pubkey
 182  	ClaimAlias(ctx context.Context, in *ClaimAliasRequest, opts ...grpc.CallOption) (*Empty, error)
 183  	// GetAliasByPubkey returns the alias for a pubkey
 184  	GetAliasByPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*AliasResponse, error)
 185  	// GetPubkeyByAlias returns the pubkey for an alias
 186  	GetPubkeyByAlias(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*PubkeyResponse, error)
 187  	// IsAliasTaken checks if an alias is already claimed
 188  	IsAliasTaken(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*BoolResponse, error)
 189  }
 190  
 191  type aCLServiceClient struct {
 192  	cc grpc.ClientConnInterface
 193  }
 194  
 195  func NewACLServiceClient(cc grpc.ClientConnInterface) ACLServiceClient {
 196  	return &aCLServiceClient{cc}
 197  }
 198  
 199  func (c *aCLServiceClient) GetAccessLevel(ctx context.Context, in *AccessLevelRequest, opts ...grpc.CallOption) (*AccessLevelResponse, error) {
 200  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 201  	out := new(AccessLevelResponse)
 202  	err := c.cc.Invoke(ctx, ACLService_GetAccessLevel_FullMethodName, in, out, cOpts...)
 203  	if err != nil {
 204  		return nil, err
 205  	}
 206  	return out, nil
 207  }
 208  
 209  func (c *aCLServiceClient) CheckPolicy(ctx context.Context, in *PolicyCheckRequest, opts ...grpc.CallOption) (*PolicyCheckResponse, error) {
 210  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 211  	out := new(PolicyCheckResponse)
 212  	err := c.cc.Invoke(ctx, ACLService_CheckPolicy_FullMethodName, in, out, cOpts...)
 213  	if err != nil {
 214  		return nil, err
 215  	}
 216  	return out, nil
 217  }
 218  
 219  func (c *aCLServiceClient) GetACLInfo(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ACLInfoResponse, error) {
 220  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 221  	out := new(ACLInfoResponse)
 222  	err := c.cc.Invoke(ctx, ACLService_GetACLInfo_FullMethodName, in, out, cOpts...)
 223  	if err != nil {
 224  		return nil, err
 225  	}
 226  	return out, nil
 227  }
 228  
 229  func (c *aCLServiceClient) GetMode(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ModeResponse, error) {
 230  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 231  	out := new(ModeResponse)
 232  	err := c.cc.Invoke(ctx, ACLService_GetMode_FullMethodName, in, out, cOpts...)
 233  	if err != nil {
 234  		return nil, err
 235  	}
 236  	return out, nil
 237  }
 238  
 239  func (c *aCLServiceClient) Ready(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReadyResponse, error) {
 240  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 241  	out := new(ReadyResponse)
 242  	err := c.cc.Invoke(ctx, ACLService_Ready_FullMethodName, in, out, cOpts...)
 243  	if err != nil {
 244  		return nil, err
 245  	}
 246  	return out, nil
 247  }
 248  
 249  func (c *aCLServiceClient) GetThrottleDelay(ctx context.Context, in *ThrottleDelayRequest, opts ...grpc.CallOption) (*ThrottleDelayResponse, error) {
 250  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 251  	out := new(ThrottleDelayResponse)
 252  	err := c.cc.Invoke(ctx, ACLService_GetThrottleDelay_FullMethodName, in, out, cOpts...)
 253  	if err != nil {
 254  		return nil, err
 255  	}
 256  	return out, nil
 257  }
 258  
 259  func (c *aCLServiceClient) AddFollow(ctx context.Context, in *AddFollowRequest, opts ...grpc.CallOption) (*Empty, error) {
 260  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 261  	out := new(Empty)
 262  	err := c.cc.Invoke(ctx, ACLService_AddFollow_FullMethodName, in, out, cOpts...)
 263  	if err != nil {
 264  		return nil, err
 265  	}
 266  	return out, nil
 267  }
 268  
 269  func (c *aCLServiceClient) GetFollowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*FollowedPubkeysResponse, error) {
 270  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 271  	out := new(FollowedPubkeysResponse)
 272  	err := c.cc.Invoke(ctx, ACLService_GetFollowedPubkeys_FullMethodName, in, out, cOpts...)
 273  	if err != nil {
 274  		return nil, err
 275  	}
 276  	return out, nil
 277  }
 278  
 279  func (c *aCLServiceClient) GetAdminRelays(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*AdminRelaysResponse, error) {
 280  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 281  	out := new(AdminRelaysResponse)
 282  	err := c.cc.Invoke(ctx, ACLService_GetAdminRelays_FullMethodName, in, out, cOpts...)
 283  	if err != nil {
 284  		return nil, err
 285  	}
 286  	return out, nil
 287  }
 288  
 289  func (c *aCLServiceClient) BanPubkey(ctx context.Context, in *BanPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 290  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 291  	out := new(Empty)
 292  	err := c.cc.Invoke(ctx, ACLService_BanPubkey_FullMethodName, in, out, cOpts...)
 293  	if err != nil {
 294  		return nil, err
 295  	}
 296  	return out, nil
 297  }
 298  
 299  func (c *aCLServiceClient) UnbanPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 300  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 301  	out := new(Empty)
 302  	err := c.cc.Invoke(ctx, ACLService_UnbanPubkey_FullMethodName, in, out, cOpts...)
 303  	if err != nil {
 304  		return nil, err
 305  	}
 306  	return out, nil
 307  }
 308  
 309  func (c *aCLServiceClient) ListBannedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedPubkeysResponse, error) {
 310  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 311  	out := new(ListBannedPubkeysResponse)
 312  	err := c.cc.Invoke(ctx, ACLService_ListBannedPubkeys_FullMethodName, in, out, cOpts...)
 313  	if err != nil {
 314  		return nil, err
 315  	}
 316  	return out, nil
 317  }
 318  
 319  func (c *aCLServiceClient) AllowPubkey(ctx context.Context, in *AllowPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 320  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 321  	out := new(Empty)
 322  	err := c.cc.Invoke(ctx, ACLService_AllowPubkey_FullMethodName, in, out, cOpts...)
 323  	if err != nil {
 324  		return nil, err
 325  	}
 326  	return out, nil
 327  }
 328  
 329  func (c *aCLServiceClient) DisallowPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 330  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 331  	out := new(Empty)
 332  	err := c.cc.Invoke(ctx, ACLService_DisallowPubkey_FullMethodName, in, out, cOpts...)
 333  	if err != nil {
 334  		return nil, err
 335  	}
 336  	return out, nil
 337  }
 338  
 339  func (c *aCLServiceClient) ListAllowedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedPubkeysResponse, error) {
 340  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 341  	out := new(ListAllowedPubkeysResponse)
 342  	err := c.cc.Invoke(ctx, ACLService_ListAllowedPubkeys_FullMethodName, in, out, cOpts...)
 343  	if err != nil {
 344  		return nil, err
 345  	}
 346  	return out, nil
 347  }
 348  
 349  func (c *aCLServiceClient) BanEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
 350  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 351  	out := new(Empty)
 352  	err := c.cc.Invoke(ctx, ACLService_BanEvent_FullMethodName, in, out, cOpts...)
 353  	if err != nil {
 354  		return nil, err
 355  	}
 356  	return out, nil
 357  }
 358  
 359  func (c *aCLServiceClient) UnbanEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
 360  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 361  	out := new(Empty)
 362  	err := c.cc.Invoke(ctx, ACLService_UnbanEvent_FullMethodName, in, out, cOpts...)
 363  	if err != nil {
 364  		return nil, err
 365  	}
 366  	return out, nil
 367  }
 368  
 369  func (c *aCLServiceClient) ListBannedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBannedEventsResponse, error) {
 370  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 371  	out := new(ListBannedEventsResponse)
 372  	err := c.cc.Invoke(ctx, ACLService_ListBannedEvents_FullMethodName, in, out, cOpts...)
 373  	if err != nil {
 374  		return nil, err
 375  	}
 376  	return out, nil
 377  }
 378  
 379  func (c *aCLServiceClient) AllowEvent(ctx context.Context, in *BanEventRequest, opts ...grpc.CallOption) (*Empty, error) {
 380  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 381  	out := new(Empty)
 382  	err := c.cc.Invoke(ctx, ACLService_AllowEvent_FullMethodName, in, out, cOpts...)
 383  	if err != nil {
 384  		return nil, err
 385  	}
 386  	return out, nil
 387  }
 388  
 389  func (c *aCLServiceClient) DisallowEvent(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
 390  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 391  	out := new(Empty)
 392  	err := c.cc.Invoke(ctx, ACLService_DisallowEvent_FullMethodName, in, out, cOpts...)
 393  	if err != nil {
 394  		return nil, err
 395  	}
 396  	return out, nil
 397  }
 398  
 399  func (c *aCLServiceClient) ListAllowedEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedEventsResponse, error) {
 400  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 401  	out := new(ListAllowedEventsResponse)
 402  	err := c.cc.Invoke(ctx, ACLService_ListAllowedEvents_FullMethodName, in, out, cOpts...)
 403  	if err != nil {
 404  		return nil, err
 405  	}
 406  	return out, nil
 407  }
 408  
 409  func (c *aCLServiceClient) BlockIP(ctx context.Context, in *BlockIPRequest, opts ...grpc.CallOption) (*Empty, error) {
 410  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 411  	out := new(Empty)
 412  	err := c.cc.Invoke(ctx, ACLService_BlockIP_FullMethodName, in, out, cOpts...)
 413  	if err != nil {
 414  		return nil, err
 415  	}
 416  	return out, nil
 417  }
 418  
 419  func (c *aCLServiceClient) UnblockIP(ctx context.Context, in *IPRequest, opts ...grpc.CallOption) (*Empty, error) {
 420  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 421  	out := new(Empty)
 422  	err := c.cc.Invoke(ctx, ACLService_UnblockIP_FullMethodName, in, out, cOpts...)
 423  	if err != nil {
 424  		return nil, err
 425  	}
 426  	return out, nil
 427  }
 428  
 429  func (c *aCLServiceClient) ListBlockedIPs(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlockedIPsResponse, error) {
 430  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 431  	out := new(ListBlockedIPsResponse)
 432  	err := c.cc.Invoke(ctx, ACLService_ListBlockedIPs_FullMethodName, in, out, cOpts...)
 433  	if err != nil {
 434  		return nil, err
 435  	}
 436  	return out, nil
 437  }
 438  
 439  func (c *aCLServiceClient) AllowKind(ctx context.Context, in *AllowKindRequest, opts ...grpc.CallOption) (*Empty, error) {
 440  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 441  	out := new(Empty)
 442  	err := c.cc.Invoke(ctx, ACLService_AllowKind_FullMethodName, in, out, cOpts...)
 443  	if err != nil {
 444  		return nil, err
 445  	}
 446  	return out, nil
 447  }
 448  
 449  func (c *aCLServiceClient) DisallowKind(ctx context.Context, in *KindRequest, opts ...grpc.CallOption) (*Empty, error) {
 450  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 451  	out := new(Empty)
 452  	err := c.cc.Invoke(ctx, ACLService_DisallowKind_FullMethodName, in, out, cOpts...)
 453  	if err != nil {
 454  		return nil, err
 455  	}
 456  	return out, nil
 457  }
 458  
 459  func (c *aCLServiceClient) ListAllowedKinds(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListAllowedKindsResponse, error) {
 460  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 461  	out := new(ListAllowedKindsResponse)
 462  	err := c.cc.Invoke(ctx, ACLService_ListAllowedKinds_FullMethodName, in, out, cOpts...)
 463  	if err != nil {
 464  		return nil, err
 465  	}
 466  	return out, nil
 467  }
 468  
 469  func (c *aCLServiceClient) UpdatePeerAdmins(ctx context.Context, in *UpdatePeerAdminsRequest, opts ...grpc.CallOption) (*Empty, error) {
 470  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 471  	out := new(Empty)
 472  	err := c.cc.Invoke(ctx, ACLService_UpdatePeerAdmins_FullMethodName, in, out, cOpts...)
 473  	if err != nil {
 474  		return nil, err
 475  	}
 476  	return out, nil
 477  }
 478  
 479  func (c *aCLServiceClient) TrustPubkey(ctx context.Context, in *TrustPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 480  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 481  	out := new(Empty)
 482  	err := c.cc.Invoke(ctx, ACLService_TrustPubkey_FullMethodName, in, out, cOpts...)
 483  	if err != nil {
 484  		return nil, err
 485  	}
 486  	return out, nil
 487  }
 488  
 489  func (c *aCLServiceClient) UntrustPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 490  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 491  	out := new(Empty)
 492  	err := c.cc.Invoke(ctx, ACLService_UntrustPubkey_FullMethodName, in, out, cOpts...)
 493  	if err != nil {
 494  		return nil, err
 495  	}
 496  	return out, nil
 497  }
 498  
 499  func (c *aCLServiceClient) ListTrustedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListTrustedPubkeysResponse, error) {
 500  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 501  	out := new(ListTrustedPubkeysResponse)
 502  	err := c.cc.Invoke(ctx, ACLService_ListTrustedPubkeys_FullMethodName, in, out, cOpts...)
 503  	if err != nil {
 504  		return nil, err
 505  	}
 506  	return out, nil
 507  }
 508  
 509  func (c *aCLServiceClient) BlacklistPubkey(ctx context.Context, in *BlacklistPubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 510  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 511  	out := new(Empty)
 512  	err := c.cc.Invoke(ctx, ACLService_BlacklistPubkey_FullMethodName, in, out, cOpts...)
 513  	if err != nil {
 514  		return nil, err
 515  	}
 516  	return out, nil
 517  }
 518  
 519  func (c *aCLServiceClient) UnblacklistPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 520  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 521  	out := new(Empty)
 522  	err := c.cc.Invoke(ctx, ACLService_UnblacklistPubkey_FullMethodName, in, out, cOpts...)
 523  	if err != nil {
 524  		return nil, err
 525  	}
 526  	return out, nil
 527  }
 528  
 529  func (c *aCLServiceClient) ListBlacklistedPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListBlacklistedPubkeysResponse, error) {
 530  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 531  	out := new(ListBlacklistedPubkeysResponse)
 532  	err := c.cc.Invoke(ctx, ACLService_ListBlacklistedPubkeys_FullMethodName, in, out, cOpts...)
 533  	if err != nil {
 534  		return nil, err
 535  	}
 536  	return out, nil
 537  }
 538  
 539  func (c *aCLServiceClient) MarkSpam(ctx context.Context, in *MarkSpamRequest, opts ...grpc.CallOption) (*Empty, error) {
 540  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 541  	out := new(Empty)
 542  	err := c.cc.Invoke(ctx, ACLService_MarkSpam_FullMethodName, in, out, cOpts...)
 543  	if err != nil {
 544  		return nil, err
 545  	}
 546  	return out, nil
 547  }
 548  
 549  func (c *aCLServiceClient) UnmarkSpam(ctx context.Context, in *EventRequest, opts ...grpc.CallOption) (*Empty, error) {
 550  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 551  	out := new(Empty)
 552  	err := c.cc.Invoke(ctx, ACLService_UnmarkSpam_FullMethodName, in, out, cOpts...)
 553  	if err != nil {
 554  		return nil, err
 555  	}
 556  	return out, nil
 557  }
 558  
 559  func (c *aCLServiceClient) ListSpamEvents(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ListSpamEventsResponse, error) {
 560  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 561  	out := new(ListSpamEventsResponse)
 562  	err := c.cc.Invoke(ctx, ACLService_ListSpamEvents_FullMethodName, in, out, cOpts...)
 563  	if err != nil {
 564  		return nil, err
 565  	}
 566  	return out, nil
 567  }
 568  
 569  func (c *aCLServiceClient) RateLimitCheck(ctx context.Context, in *RateLimitCheckRequest, opts ...grpc.CallOption) (*RateLimitCheckResponse, error) {
 570  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 571  	out := new(RateLimitCheckResponse)
 572  	err := c.cc.Invoke(ctx, ACLService_RateLimitCheck_FullMethodName, in, out, cOpts...)
 573  	if err != nil {
 574  		return nil, err
 575  	}
 576  	return out, nil
 577  }
 578  
 579  func (c *aCLServiceClient) ProcessConfigEvent(ctx context.Context, in *ConfigEventRequest, opts ...grpc.CallOption) (*Empty, error) {
 580  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 581  	out := new(Empty)
 582  	err := c.cc.Invoke(ctx, ACLService_ProcessConfigEvent_FullMethodName, in, out, cOpts...)
 583  	if err != nil {
 584  		return nil, err
 585  	}
 586  	return out, nil
 587  }
 588  
 589  func (c *aCLServiceClient) GetCuratingConfig(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CuratingConfig, error) {
 590  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 591  	out := new(CuratingConfig)
 592  	err := c.cc.Invoke(ctx, ACLService_GetCuratingConfig_FullMethodName, in, out, cOpts...)
 593  	if err != nil {
 594  		return nil, err
 595  	}
 596  	return out, nil
 597  }
 598  
 599  func (c *aCLServiceClient) IsCuratingConfigured(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*BoolResponse, error) {
 600  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 601  	out := new(BoolResponse)
 602  	err := c.cc.Invoke(ctx, ACLService_IsCuratingConfigured_FullMethodName, in, out, cOpts...)
 603  	if err != nil {
 604  		return nil, err
 605  	}
 606  	return out, nil
 607  }
 608  
 609  func (c *aCLServiceClient) ListUnclassifiedUsers(ctx context.Context, in *PaginationRequest, opts ...grpc.CallOption) (*ListUnclassifiedUsersResponse, error) {
 610  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 611  	out := new(ListUnclassifiedUsersResponse)
 612  	err := c.cc.Invoke(ctx, ACLService_ListUnclassifiedUsers_FullMethodName, in, out, cOpts...)
 613  	if err != nil {
 614  		return nil, err
 615  	}
 616  	return out, nil
 617  }
 618  
 619  func (c *aCLServiceClient) GetEventsForPubkey(ctx context.Context, in *GetEventsForPubkeyRequest, opts ...grpc.CallOption) (*EventsForPubkeyResponse, error) {
 620  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 621  	out := new(EventsForPubkeyResponse)
 622  	err := c.cc.Invoke(ctx, ACLService_GetEventsForPubkey_FullMethodName, in, out, cOpts...)
 623  	if err != nil {
 624  		return nil, err
 625  	}
 626  	return out, nil
 627  }
 628  
 629  func (c *aCLServiceClient) DeleteEventsForPubkey(ctx context.Context, in *DeleteEventsForPubkeyRequest, opts ...grpc.CallOption) (*DeleteCountResponse, error) {
 630  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 631  	out := new(DeleteCountResponse)
 632  	err := c.cc.Invoke(ctx, ACLService_DeleteEventsForPubkey_FullMethodName, in, out, cOpts...)
 633  	if err != nil {
 634  		return nil, err
 635  	}
 636  	return out, nil
 637  }
 638  
 639  func (c *aCLServiceClient) ScanAllPubkeys(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ScanResultResponse, error) {
 640  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 641  	out := new(ScanResultResponse)
 642  	err := c.cc.Invoke(ctx, ACLService_ScanAllPubkeys_FullMethodName, in, out, cOpts...)
 643  	if err != nil {
 644  		return nil, err
 645  	}
 646  	return out, nil
 647  }
 648  
 649  func (c *aCLServiceClient) SubscribePubkey(ctx context.Context, in *SubscribeRequest, opts ...grpc.CallOption) (*Empty, error) {
 650  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 651  	out := new(Empty)
 652  	err := c.cc.Invoke(ctx, ACLService_SubscribePubkey_FullMethodName, in, out, cOpts...)
 653  	if err != nil {
 654  		return nil, err
 655  	}
 656  	return out, nil
 657  }
 658  
 659  func (c *aCLServiceClient) UnsubscribePubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*Empty, error) {
 660  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 661  	out := new(Empty)
 662  	err := c.cc.Invoke(ctx, ACLService_UnsubscribePubkey_FullMethodName, in, out, cOpts...)
 663  	if err != nil {
 664  		return nil, err
 665  	}
 666  	return out, nil
 667  }
 668  
 669  func (c *aCLServiceClient) IsSubscribed(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*BoolResponse, error) {
 670  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 671  	out := new(BoolResponse)
 672  	err := c.cc.Invoke(ctx, ACLService_IsSubscribed_FullMethodName, in, out, cOpts...)
 673  	if err != nil {
 674  		return nil, err
 675  	}
 676  	return out, nil
 677  }
 678  
 679  func (c *aCLServiceClient) GetSubscription(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*SubscriptionResponse, error) {
 680  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 681  	out := new(SubscriptionResponse)
 682  	err := c.cc.Invoke(ctx, ACLService_GetSubscription_FullMethodName, in, out, cOpts...)
 683  	if err != nil {
 684  		return nil, err
 685  	}
 686  	return out, nil
 687  }
 688  
 689  func (c *aCLServiceClient) ClaimAlias(ctx context.Context, in *ClaimAliasRequest, opts ...grpc.CallOption) (*Empty, error) {
 690  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 691  	out := new(Empty)
 692  	err := c.cc.Invoke(ctx, ACLService_ClaimAlias_FullMethodName, in, out, cOpts...)
 693  	if err != nil {
 694  		return nil, err
 695  	}
 696  	return out, nil
 697  }
 698  
 699  func (c *aCLServiceClient) GetAliasByPubkey(ctx context.Context, in *PubkeyRequest, opts ...grpc.CallOption) (*AliasResponse, error) {
 700  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 701  	out := new(AliasResponse)
 702  	err := c.cc.Invoke(ctx, ACLService_GetAliasByPubkey_FullMethodName, in, out, cOpts...)
 703  	if err != nil {
 704  		return nil, err
 705  	}
 706  	return out, nil
 707  }
 708  
 709  func (c *aCLServiceClient) GetPubkeyByAlias(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*PubkeyResponse, error) {
 710  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 711  	out := new(PubkeyResponse)
 712  	err := c.cc.Invoke(ctx, ACLService_GetPubkeyByAlias_FullMethodName, in, out, cOpts...)
 713  	if err != nil {
 714  		return nil, err
 715  	}
 716  	return out, nil
 717  }
 718  
 719  func (c *aCLServiceClient) IsAliasTaken(ctx context.Context, in *AliasRequest, opts ...grpc.CallOption) (*BoolResponse, error) {
 720  	cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
 721  	out := new(BoolResponse)
 722  	err := c.cc.Invoke(ctx, ACLService_IsAliasTaken_FullMethodName, in, out, cOpts...)
 723  	if err != nil {
 724  		return nil, err
 725  	}
 726  	return out, nil
 727  }
 728  
 729  // ACLServiceServer is the server API for ACLService service.
 730  // All implementations must embed UnimplementedACLServiceServer
 731  // for forward compatibility.
 732  //
 733  // ACLService provides access control operations for the Nostr relay
 734  type ACLServiceServer interface {
 735  	// GetAccessLevel returns the access level for a pubkey from an IP address
 736  	GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error)
 737  	// CheckPolicy checks if an event passes policy checks
 738  	CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error)
 739  	// GetACLInfo returns information about the active ACL mode
 740  	GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error)
 741  	// GetMode returns the current ACL mode (none/follows/managed/curating)
 742  	GetMode(context.Context, *Empty) (*ModeResponse, error)
 743  	// Ready checks if the ACL service is ready
 744  	Ready(context.Context, *Empty) (*ReadyResponse, error)
 745  	// GetThrottleDelay returns the progressive throttle delay for a pubkey
 746  	GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error)
 747  	// AddFollow adds a pubkey to the followed list
 748  	AddFollow(context.Context, *AddFollowRequest) (*Empty, error)
 749  	// GetFollowedPubkeys returns all followed pubkeys
 750  	GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error)
 751  	// GetAdminRelays returns the relay URLs from admin kind 10002 events
 752  	GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error)
 753  	// BanPubkey adds a pubkey to the ban list
 754  	BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error)
 755  	// UnbanPubkey removes a pubkey from the ban list
 756  	UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error)
 757  	// ListBannedPubkeys returns all banned pubkeys
 758  	ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error)
 759  	// AllowPubkey adds a pubkey to the allow list
 760  	AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error)
 761  	// DisallowPubkey removes a pubkey from the allow list
 762  	DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error)
 763  	// ListAllowedPubkeys returns all explicitly allowed pubkeys
 764  	ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error)
 765  	// BanEvent adds an event to the ban list
 766  	BanEvent(context.Context, *BanEventRequest) (*Empty, error)
 767  	// UnbanEvent removes an event from the ban list
 768  	UnbanEvent(context.Context, *EventRequest) (*Empty, error)
 769  	// ListBannedEvents returns all banned events
 770  	ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error)
 771  	// AllowEvent adds an event to the allow list
 772  	AllowEvent(context.Context, *BanEventRequest) (*Empty, error)
 773  	// DisallowEvent removes an event from the allow list
 774  	DisallowEvent(context.Context, *EventRequest) (*Empty, error)
 775  	// ListAllowedEvents returns all explicitly allowed events
 776  	ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error)
 777  	// BlockIP adds an IP to the block list
 778  	BlockIP(context.Context, *BlockIPRequest) (*Empty, error)
 779  	// UnblockIP removes an IP from the block list
 780  	UnblockIP(context.Context, *IPRequest) (*Empty, error)
 781  	// ListBlockedIPs returns all blocked IPs
 782  	ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error)
 783  	// AllowKind adds a kind to the allow list
 784  	AllowKind(context.Context, *AllowKindRequest) (*Empty, error)
 785  	// DisallowKind removes a kind from the allow list
 786  	DisallowKind(context.Context, *KindRequest) (*Empty, error)
 787  	// ListAllowedKinds returns all allowed kinds
 788  	ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error)
 789  	// UpdatePeerAdmins updates the peer relay identity pubkeys
 790  	UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error)
 791  	// TrustPubkey adds a pubkey to the trusted list
 792  	TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error)
 793  	// UntrustPubkey removes a pubkey from the trusted list
 794  	UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error)
 795  	// ListTrustedPubkeys returns all trusted pubkeys
 796  	ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error)
 797  	// BlacklistPubkey adds a pubkey to the blacklist
 798  	BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error)
 799  	// UnblacklistPubkey removes a pubkey from the blacklist
 800  	UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error)
 801  	// ListBlacklistedPubkeys returns all blacklisted pubkeys
 802  	ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error)
 803  	// MarkSpam marks an event as spam
 804  	MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error)
 805  	// UnmarkSpam removes the spam flag from an event
 806  	UnmarkSpam(context.Context, *EventRequest) (*Empty, error)
 807  	// ListSpamEvents returns all spam-flagged events
 808  	ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error)
 809  	// RateLimitCheck checks if a pubkey/IP can publish (rate limiting)
 810  	RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error)
 811  	// ProcessConfigEvent processes a curating config event (kind 30078)
 812  	ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error)
 813  	// GetCuratingConfig returns the current curating configuration
 814  	GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error)
 815  	// IsCuratingConfigured checks if curating mode is configured
 816  	IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error)
 817  	// ListUnclassifiedUsers returns users who are not trusted or blacklisted
 818  	ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error)
 819  	// GetEventsForPubkey returns events for a specific pubkey
 820  	GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error)
 821  	// DeleteEventsForPubkey deletes all events for a pubkey
 822  	DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error)
 823  	// ScanAllPubkeys scans and indexes all pubkeys in the database
 824  	ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error)
 825  	// SubscribePubkey activates a subscription for a pubkey
 826  	SubscribePubkey(context.Context, *SubscribeRequest) (*Empty, error)
 827  	// UnsubscribePubkey removes a subscription
 828  	UnsubscribePubkey(context.Context, *PubkeyRequest) (*Empty, error)
 829  	// IsSubscribed checks if a pubkey has an active subscription
 830  	IsSubscribed(context.Context, *PubkeyRequest) (*BoolResponse, error)
 831  	// GetSubscription returns subscription details for a pubkey
 832  	GetSubscription(context.Context, *PubkeyRequest) (*SubscriptionResponse, error)
 833  	// ClaimAlias claims an email alias for a pubkey
 834  	ClaimAlias(context.Context, *ClaimAliasRequest) (*Empty, error)
 835  	// GetAliasByPubkey returns the alias for a pubkey
 836  	GetAliasByPubkey(context.Context, *PubkeyRequest) (*AliasResponse, error)
 837  	// GetPubkeyByAlias returns the pubkey for an alias
 838  	GetPubkeyByAlias(context.Context, *AliasRequest) (*PubkeyResponse, error)
 839  	// IsAliasTaken checks if an alias is already claimed
 840  	IsAliasTaken(context.Context, *AliasRequest) (*BoolResponse, error)
 841  	mustEmbedUnimplementedACLServiceServer()
 842  }
 843  
 844  // UnimplementedACLServiceServer must be embedded to have
 845  // forward compatible implementations.
 846  //
 847  // NOTE: this should be embedded by value instead of pointer to avoid a nil
 848  // pointer dereference when methods are called.
 849  type UnimplementedACLServiceServer struct{}
 850  
 851  func (UnimplementedACLServiceServer) GetAccessLevel(context.Context, *AccessLevelRequest) (*AccessLevelResponse, error) {
 852  	return nil, status.Error(codes.Unimplemented, "method GetAccessLevel not implemented")
 853  }
 854  func (UnimplementedACLServiceServer) CheckPolicy(context.Context, *PolicyCheckRequest) (*PolicyCheckResponse, error) {
 855  	return nil, status.Error(codes.Unimplemented, "method CheckPolicy not implemented")
 856  }
 857  func (UnimplementedACLServiceServer) GetACLInfo(context.Context, *Empty) (*ACLInfoResponse, error) {
 858  	return nil, status.Error(codes.Unimplemented, "method GetACLInfo not implemented")
 859  }
 860  func (UnimplementedACLServiceServer) GetMode(context.Context, *Empty) (*ModeResponse, error) {
 861  	return nil, status.Error(codes.Unimplemented, "method GetMode not implemented")
 862  }
 863  func (UnimplementedACLServiceServer) Ready(context.Context, *Empty) (*ReadyResponse, error) {
 864  	return nil, status.Error(codes.Unimplemented, "method Ready not implemented")
 865  }
 866  func (UnimplementedACLServiceServer) GetThrottleDelay(context.Context, *ThrottleDelayRequest) (*ThrottleDelayResponse, error) {
 867  	return nil, status.Error(codes.Unimplemented, "method GetThrottleDelay not implemented")
 868  }
 869  func (UnimplementedACLServiceServer) AddFollow(context.Context, *AddFollowRequest) (*Empty, error) {
 870  	return nil, status.Error(codes.Unimplemented, "method AddFollow not implemented")
 871  }
 872  func (UnimplementedACLServiceServer) GetFollowedPubkeys(context.Context, *Empty) (*FollowedPubkeysResponse, error) {
 873  	return nil, status.Error(codes.Unimplemented, "method GetFollowedPubkeys not implemented")
 874  }
 875  func (UnimplementedACLServiceServer) GetAdminRelays(context.Context, *Empty) (*AdminRelaysResponse, error) {
 876  	return nil, status.Error(codes.Unimplemented, "method GetAdminRelays not implemented")
 877  }
 878  func (UnimplementedACLServiceServer) BanPubkey(context.Context, *BanPubkeyRequest) (*Empty, error) {
 879  	return nil, status.Error(codes.Unimplemented, "method BanPubkey not implemented")
 880  }
 881  func (UnimplementedACLServiceServer) UnbanPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
 882  	return nil, status.Error(codes.Unimplemented, "method UnbanPubkey not implemented")
 883  }
 884  func (UnimplementedACLServiceServer) ListBannedPubkeys(context.Context, *Empty) (*ListBannedPubkeysResponse, error) {
 885  	return nil, status.Error(codes.Unimplemented, "method ListBannedPubkeys not implemented")
 886  }
 887  func (UnimplementedACLServiceServer) AllowPubkey(context.Context, *AllowPubkeyRequest) (*Empty, error) {
 888  	return nil, status.Error(codes.Unimplemented, "method AllowPubkey not implemented")
 889  }
 890  func (UnimplementedACLServiceServer) DisallowPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
 891  	return nil, status.Error(codes.Unimplemented, "method DisallowPubkey not implemented")
 892  }
 893  func (UnimplementedACLServiceServer) ListAllowedPubkeys(context.Context, *Empty) (*ListAllowedPubkeysResponse, error) {
 894  	return nil, status.Error(codes.Unimplemented, "method ListAllowedPubkeys not implemented")
 895  }
 896  func (UnimplementedACLServiceServer) BanEvent(context.Context, *BanEventRequest) (*Empty, error) {
 897  	return nil, status.Error(codes.Unimplemented, "method BanEvent not implemented")
 898  }
 899  func (UnimplementedACLServiceServer) UnbanEvent(context.Context, *EventRequest) (*Empty, error) {
 900  	return nil, status.Error(codes.Unimplemented, "method UnbanEvent not implemented")
 901  }
 902  func (UnimplementedACLServiceServer) ListBannedEvents(context.Context, *Empty) (*ListBannedEventsResponse, error) {
 903  	return nil, status.Error(codes.Unimplemented, "method ListBannedEvents not implemented")
 904  }
 905  func (UnimplementedACLServiceServer) AllowEvent(context.Context, *BanEventRequest) (*Empty, error) {
 906  	return nil, status.Error(codes.Unimplemented, "method AllowEvent not implemented")
 907  }
 908  func (UnimplementedACLServiceServer) DisallowEvent(context.Context, *EventRequest) (*Empty, error) {
 909  	return nil, status.Error(codes.Unimplemented, "method DisallowEvent not implemented")
 910  }
 911  func (UnimplementedACLServiceServer) ListAllowedEvents(context.Context, *Empty) (*ListAllowedEventsResponse, error) {
 912  	return nil, status.Error(codes.Unimplemented, "method ListAllowedEvents not implemented")
 913  }
 914  func (UnimplementedACLServiceServer) BlockIP(context.Context, *BlockIPRequest) (*Empty, error) {
 915  	return nil, status.Error(codes.Unimplemented, "method BlockIP not implemented")
 916  }
 917  func (UnimplementedACLServiceServer) UnblockIP(context.Context, *IPRequest) (*Empty, error) {
 918  	return nil, status.Error(codes.Unimplemented, "method UnblockIP not implemented")
 919  }
 920  func (UnimplementedACLServiceServer) ListBlockedIPs(context.Context, *Empty) (*ListBlockedIPsResponse, error) {
 921  	return nil, status.Error(codes.Unimplemented, "method ListBlockedIPs not implemented")
 922  }
 923  func (UnimplementedACLServiceServer) AllowKind(context.Context, *AllowKindRequest) (*Empty, error) {
 924  	return nil, status.Error(codes.Unimplemented, "method AllowKind not implemented")
 925  }
 926  func (UnimplementedACLServiceServer) DisallowKind(context.Context, *KindRequest) (*Empty, error) {
 927  	return nil, status.Error(codes.Unimplemented, "method DisallowKind not implemented")
 928  }
 929  func (UnimplementedACLServiceServer) ListAllowedKinds(context.Context, *Empty) (*ListAllowedKindsResponse, error) {
 930  	return nil, status.Error(codes.Unimplemented, "method ListAllowedKinds not implemented")
 931  }
 932  func (UnimplementedACLServiceServer) UpdatePeerAdmins(context.Context, *UpdatePeerAdminsRequest) (*Empty, error) {
 933  	return nil, status.Error(codes.Unimplemented, "method UpdatePeerAdmins not implemented")
 934  }
 935  func (UnimplementedACLServiceServer) TrustPubkey(context.Context, *TrustPubkeyRequest) (*Empty, error) {
 936  	return nil, status.Error(codes.Unimplemented, "method TrustPubkey not implemented")
 937  }
 938  func (UnimplementedACLServiceServer) UntrustPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
 939  	return nil, status.Error(codes.Unimplemented, "method UntrustPubkey not implemented")
 940  }
 941  func (UnimplementedACLServiceServer) ListTrustedPubkeys(context.Context, *Empty) (*ListTrustedPubkeysResponse, error) {
 942  	return nil, status.Error(codes.Unimplemented, "method ListTrustedPubkeys not implemented")
 943  }
 944  func (UnimplementedACLServiceServer) BlacklistPubkey(context.Context, *BlacklistPubkeyRequest) (*Empty, error) {
 945  	return nil, status.Error(codes.Unimplemented, "method BlacklistPubkey not implemented")
 946  }
 947  func (UnimplementedACLServiceServer) UnblacklistPubkey(context.Context, *PubkeyRequest) (*Empty, error) {
 948  	return nil, status.Error(codes.Unimplemented, "method UnblacklistPubkey not implemented")
 949  }
 950  func (UnimplementedACLServiceServer) ListBlacklistedPubkeys(context.Context, *Empty) (*ListBlacklistedPubkeysResponse, error) {
 951  	return nil, status.Error(codes.Unimplemented, "method ListBlacklistedPubkeys not implemented")
 952  }
 953  func (UnimplementedACLServiceServer) MarkSpam(context.Context, *MarkSpamRequest) (*Empty, error) {
 954  	return nil, status.Error(codes.Unimplemented, "method MarkSpam not implemented")
 955  }
 956  func (UnimplementedACLServiceServer) UnmarkSpam(context.Context, *EventRequest) (*Empty, error) {
 957  	return nil, status.Error(codes.Unimplemented, "method UnmarkSpam not implemented")
 958  }
 959  func (UnimplementedACLServiceServer) ListSpamEvents(context.Context, *Empty) (*ListSpamEventsResponse, error) {
 960  	return nil, status.Error(codes.Unimplemented, "method ListSpamEvents not implemented")
 961  }
 962  func (UnimplementedACLServiceServer) RateLimitCheck(context.Context, *RateLimitCheckRequest) (*RateLimitCheckResponse, error) {
 963  	return nil, status.Error(codes.Unimplemented, "method RateLimitCheck not implemented")
 964  }
 965  func (UnimplementedACLServiceServer) ProcessConfigEvent(context.Context, *ConfigEventRequest) (*Empty, error) {
 966  	return nil, status.Error(codes.Unimplemented, "method ProcessConfigEvent not implemented")
 967  }
 968  func (UnimplementedACLServiceServer) GetCuratingConfig(context.Context, *Empty) (*CuratingConfig, error) {
 969  	return nil, status.Error(codes.Unimplemented, "method GetCuratingConfig not implemented")
 970  }
 971  func (UnimplementedACLServiceServer) IsCuratingConfigured(context.Context, *Empty) (*BoolResponse, error) {
 972  	return nil, status.Error(codes.Unimplemented, "method IsCuratingConfigured not implemented")
 973  }
 974  func (UnimplementedACLServiceServer) ListUnclassifiedUsers(context.Context, *PaginationRequest) (*ListUnclassifiedUsersResponse, error) {
 975  	return nil, status.Error(codes.Unimplemented, "method ListUnclassifiedUsers not implemented")
 976  }
 977  func (UnimplementedACLServiceServer) GetEventsForPubkey(context.Context, *GetEventsForPubkeyRequest) (*EventsForPubkeyResponse, error) {
 978  	return nil, status.Error(codes.Unimplemented, "method GetEventsForPubkey not implemented")
 979  }
 980  func (UnimplementedACLServiceServer) DeleteEventsForPubkey(context.Context, *DeleteEventsForPubkeyRequest) (*DeleteCountResponse, error) {
 981  	return nil, status.Error(codes.Unimplemented, "method DeleteEventsForPubkey not implemented")
 982  }
 983  func (UnimplementedACLServiceServer) ScanAllPubkeys(context.Context, *Empty) (*ScanResultResponse, error) {
 984  	return nil, status.Error(codes.Unimplemented, "method ScanAllPubkeys not implemented")
 985  }
 986  func (UnimplementedACLServiceServer) SubscribePubkey(context.Context, *SubscribeRequest) (*Empty, error) {
 987  	return nil, status.Error(codes.Unimplemented, "method SubscribePubkey not implemented")
 988  }
 989  func (UnimplementedACLServiceServer) UnsubscribePubkey(context.Context, *PubkeyRequest) (*Empty, error) {
 990  	return nil, status.Error(codes.Unimplemented, "method UnsubscribePubkey not implemented")
 991  }
 992  func (UnimplementedACLServiceServer) IsSubscribed(context.Context, *PubkeyRequest) (*BoolResponse, error) {
 993  	return nil, status.Error(codes.Unimplemented, "method IsSubscribed not implemented")
 994  }
 995  func (UnimplementedACLServiceServer) GetSubscription(context.Context, *PubkeyRequest) (*SubscriptionResponse, error) {
 996  	return nil, status.Error(codes.Unimplemented, "method GetSubscription not implemented")
 997  }
 998  func (UnimplementedACLServiceServer) ClaimAlias(context.Context, *ClaimAliasRequest) (*Empty, error) {
 999  	return nil, status.Error(codes.Unimplemented, "method ClaimAlias not implemented")
1000  }
1001  func (UnimplementedACLServiceServer) GetAliasByPubkey(context.Context, *PubkeyRequest) (*AliasResponse, error) {
1002  	return nil, status.Error(codes.Unimplemented, "method GetAliasByPubkey not implemented")
1003  }
1004  func (UnimplementedACLServiceServer) GetPubkeyByAlias(context.Context, *AliasRequest) (*PubkeyResponse, error) {
1005  	return nil, status.Error(codes.Unimplemented, "method GetPubkeyByAlias not implemented")
1006  }
1007  func (UnimplementedACLServiceServer) IsAliasTaken(context.Context, *AliasRequest) (*BoolResponse, error) {
1008  	return nil, status.Error(codes.Unimplemented, "method IsAliasTaken not implemented")
1009  }
1010  func (UnimplementedACLServiceServer) mustEmbedUnimplementedACLServiceServer() {}
1011  func (UnimplementedACLServiceServer) testEmbeddedByValue()                    {}
1012  
1013  // UnsafeACLServiceServer may be embedded to opt out of forward compatibility for this service.
1014  // Use of this interface is not recommended, as added methods to ACLServiceServer will
1015  // result in compilation errors.
1016  type UnsafeACLServiceServer interface {
1017  	mustEmbedUnimplementedACLServiceServer()
1018  }
1019  
1020  func RegisterACLServiceServer(s grpc.ServiceRegistrar, srv ACLServiceServer) {
1021  	// If the following call panics, it indicates UnimplementedACLServiceServer was
1022  	// embedded by pointer and is nil.  This will cause panics if an
1023  	// unimplemented method is ever invoked, so we test this at initialization
1024  	// time to prevent it from happening at runtime later due to I/O.
1025  	if t, ok := srv.(interface{ testEmbeddedByValue() }); ok {
1026  		t.testEmbeddedByValue()
1027  	}
1028  	s.RegisterService(&ACLService_ServiceDesc, srv)
1029  }
1030  
1031  func _ACLService_GetAccessLevel_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1032  	in := new(AccessLevelRequest)
1033  	if err := dec(in); err != nil {
1034  		return nil, err
1035  	}
1036  	if interceptor == nil {
1037  		return srv.(ACLServiceServer).GetAccessLevel(ctx, in)
1038  	}
1039  	info := &grpc.UnaryServerInfo{
1040  		Server:     srv,
1041  		FullMethod: ACLService_GetAccessLevel_FullMethodName,
1042  	}
1043  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1044  		return srv.(ACLServiceServer).GetAccessLevel(ctx, req.(*AccessLevelRequest))
1045  	}
1046  	return interceptor(ctx, in, info, handler)
1047  }
1048  
1049  func _ACLService_CheckPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1050  	in := new(PolicyCheckRequest)
1051  	if err := dec(in); err != nil {
1052  		return nil, err
1053  	}
1054  	if interceptor == nil {
1055  		return srv.(ACLServiceServer).CheckPolicy(ctx, in)
1056  	}
1057  	info := &grpc.UnaryServerInfo{
1058  		Server:     srv,
1059  		FullMethod: ACLService_CheckPolicy_FullMethodName,
1060  	}
1061  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1062  		return srv.(ACLServiceServer).CheckPolicy(ctx, req.(*PolicyCheckRequest))
1063  	}
1064  	return interceptor(ctx, in, info, handler)
1065  }
1066  
1067  func _ACLService_GetACLInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1068  	in := new(Empty)
1069  	if err := dec(in); err != nil {
1070  		return nil, err
1071  	}
1072  	if interceptor == nil {
1073  		return srv.(ACLServiceServer).GetACLInfo(ctx, in)
1074  	}
1075  	info := &grpc.UnaryServerInfo{
1076  		Server:     srv,
1077  		FullMethod: ACLService_GetACLInfo_FullMethodName,
1078  	}
1079  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1080  		return srv.(ACLServiceServer).GetACLInfo(ctx, req.(*Empty))
1081  	}
1082  	return interceptor(ctx, in, info, handler)
1083  }
1084  
1085  func _ACLService_GetMode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1086  	in := new(Empty)
1087  	if err := dec(in); err != nil {
1088  		return nil, err
1089  	}
1090  	if interceptor == nil {
1091  		return srv.(ACLServiceServer).GetMode(ctx, in)
1092  	}
1093  	info := &grpc.UnaryServerInfo{
1094  		Server:     srv,
1095  		FullMethod: ACLService_GetMode_FullMethodName,
1096  	}
1097  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1098  		return srv.(ACLServiceServer).GetMode(ctx, req.(*Empty))
1099  	}
1100  	return interceptor(ctx, in, info, handler)
1101  }
1102  
1103  func _ACLService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1104  	in := new(Empty)
1105  	if err := dec(in); err != nil {
1106  		return nil, err
1107  	}
1108  	if interceptor == nil {
1109  		return srv.(ACLServiceServer).Ready(ctx, in)
1110  	}
1111  	info := &grpc.UnaryServerInfo{
1112  		Server:     srv,
1113  		FullMethod: ACLService_Ready_FullMethodName,
1114  	}
1115  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1116  		return srv.(ACLServiceServer).Ready(ctx, req.(*Empty))
1117  	}
1118  	return interceptor(ctx, in, info, handler)
1119  }
1120  
1121  func _ACLService_GetThrottleDelay_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1122  	in := new(ThrottleDelayRequest)
1123  	if err := dec(in); err != nil {
1124  		return nil, err
1125  	}
1126  	if interceptor == nil {
1127  		return srv.(ACLServiceServer).GetThrottleDelay(ctx, in)
1128  	}
1129  	info := &grpc.UnaryServerInfo{
1130  		Server:     srv,
1131  		FullMethod: ACLService_GetThrottleDelay_FullMethodName,
1132  	}
1133  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1134  		return srv.(ACLServiceServer).GetThrottleDelay(ctx, req.(*ThrottleDelayRequest))
1135  	}
1136  	return interceptor(ctx, in, info, handler)
1137  }
1138  
1139  func _ACLService_AddFollow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1140  	in := new(AddFollowRequest)
1141  	if err := dec(in); err != nil {
1142  		return nil, err
1143  	}
1144  	if interceptor == nil {
1145  		return srv.(ACLServiceServer).AddFollow(ctx, in)
1146  	}
1147  	info := &grpc.UnaryServerInfo{
1148  		Server:     srv,
1149  		FullMethod: ACLService_AddFollow_FullMethodName,
1150  	}
1151  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1152  		return srv.(ACLServiceServer).AddFollow(ctx, req.(*AddFollowRequest))
1153  	}
1154  	return interceptor(ctx, in, info, handler)
1155  }
1156  
1157  func _ACLService_GetFollowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1158  	in := new(Empty)
1159  	if err := dec(in); err != nil {
1160  		return nil, err
1161  	}
1162  	if interceptor == nil {
1163  		return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, in)
1164  	}
1165  	info := &grpc.UnaryServerInfo{
1166  		Server:     srv,
1167  		FullMethod: ACLService_GetFollowedPubkeys_FullMethodName,
1168  	}
1169  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1170  		return srv.(ACLServiceServer).GetFollowedPubkeys(ctx, req.(*Empty))
1171  	}
1172  	return interceptor(ctx, in, info, handler)
1173  }
1174  
1175  func _ACLService_GetAdminRelays_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1176  	in := new(Empty)
1177  	if err := dec(in); err != nil {
1178  		return nil, err
1179  	}
1180  	if interceptor == nil {
1181  		return srv.(ACLServiceServer).GetAdminRelays(ctx, in)
1182  	}
1183  	info := &grpc.UnaryServerInfo{
1184  		Server:     srv,
1185  		FullMethod: ACLService_GetAdminRelays_FullMethodName,
1186  	}
1187  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1188  		return srv.(ACLServiceServer).GetAdminRelays(ctx, req.(*Empty))
1189  	}
1190  	return interceptor(ctx, in, info, handler)
1191  }
1192  
1193  func _ACLService_BanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1194  	in := new(BanPubkeyRequest)
1195  	if err := dec(in); err != nil {
1196  		return nil, err
1197  	}
1198  	if interceptor == nil {
1199  		return srv.(ACLServiceServer).BanPubkey(ctx, in)
1200  	}
1201  	info := &grpc.UnaryServerInfo{
1202  		Server:     srv,
1203  		FullMethod: ACLService_BanPubkey_FullMethodName,
1204  	}
1205  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1206  		return srv.(ACLServiceServer).BanPubkey(ctx, req.(*BanPubkeyRequest))
1207  	}
1208  	return interceptor(ctx, in, info, handler)
1209  }
1210  
1211  func _ACLService_UnbanPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1212  	in := new(PubkeyRequest)
1213  	if err := dec(in); err != nil {
1214  		return nil, err
1215  	}
1216  	if interceptor == nil {
1217  		return srv.(ACLServiceServer).UnbanPubkey(ctx, in)
1218  	}
1219  	info := &grpc.UnaryServerInfo{
1220  		Server:     srv,
1221  		FullMethod: ACLService_UnbanPubkey_FullMethodName,
1222  	}
1223  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1224  		return srv.(ACLServiceServer).UnbanPubkey(ctx, req.(*PubkeyRequest))
1225  	}
1226  	return interceptor(ctx, in, info, handler)
1227  }
1228  
1229  func _ACLService_ListBannedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1230  	in := new(Empty)
1231  	if err := dec(in); err != nil {
1232  		return nil, err
1233  	}
1234  	if interceptor == nil {
1235  		return srv.(ACLServiceServer).ListBannedPubkeys(ctx, in)
1236  	}
1237  	info := &grpc.UnaryServerInfo{
1238  		Server:     srv,
1239  		FullMethod: ACLService_ListBannedPubkeys_FullMethodName,
1240  	}
1241  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1242  		return srv.(ACLServiceServer).ListBannedPubkeys(ctx, req.(*Empty))
1243  	}
1244  	return interceptor(ctx, in, info, handler)
1245  }
1246  
1247  func _ACLService_AllowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1248  	in := new(AllowPubkeyRequest)
1249  	if err := dec(in); err != nil {
1250  		return nil, err
1251  	}
1252  	if interceptor == nil {
1253  		return srv.(ACLServiceServer).AllowPubkey(ctx, in)
1254  	}
1255  	info := &grpc.UnaryServerInfo{
1256  		Server:     srv,
1257  		FullMethod: ACLService_AllowPubkey_FullMethodName,
1258  	}
1259  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1260  		return srv.(ACLServiceServer).AllowPubkey(ctx, req.(*AllowPubkeyRequest))
1261  	}
1262  	return interceptor(ctx, in, info, handler)
1263  }
1264  
1265  func _ACLService_DisallowPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1266  	in := new(PubkeyRequest)
1267  	if err := dec(in); err != nil {
1268  		return nil, err
1269  	}
1270  	if interceptor == nil {
1271  		return srv.(ACLServiceServer).DisallowPubkey(ctx, in)
1272  	}
1273  	info := &grpc.UnaryServerInfo{
1274  		Server:     srv,
1275  		FullMethod: ACLService_DisallowPubkey_FullMethodName,
1276  	}
1277  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1278  		return srv.(ACLServiceServer).DisallowPubkey(ctx, req.(*PubkeyRequest))
1279  	}
1280  	return interceptor(ctx, in, info, handler)
1281  }
1282  
1283  func _ACLService_ListAllowedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1284  	in := new(Empty)
1285  	if err := dec(in); err != nil {
1286  		return nil, err
1287  	}
1288  	if interceptor == nil {
1289  		return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, in)
1290  	}
1291  	info := &grpc.UnaryServerInfo{
1292  		Server:     srv,
1293  		FullMethod: ACLService_ListAllowedPubkeys_FullMethodName,
1294  	}
1295  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1296  		return srv.(ACLServiceServer).ListAllowedPubkeys(ctx, req.(*Empty))
1297  	}
1298  	return interceptor(ctx, in, info, handler)
1299  }
1300  
1301  func _ACLService_BanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1302  	in := new(BanEventRequest)
1303  	if err := dec(in); err != nil {
1304  		return nil, err
1305  	}
1306  	if interceptor == nil {
1307  		return srv.(ACLServiceServer).BanEvent(ctx, in)
1308  	}
1309  	info := &grpc.UnaryServerInfo{
1310  		Server:     srv,
1311  		FullMethod: ACLService_BanEvent_FullMethodName,
1312  	}
1313  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1314  		return srv.(ACLServiceServer).BanEvent(ctx, req.(*BanEventRequest))
1315  	}
1316  	return interceptor(ctx, in, info, handler)
1317  }
1318  
1319  func _ACLService_UnbanEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1320  	in := new(EventRequest)
1321  	if err := dec(in); err != nil {
1322  		return nil, err
1323  	}
1324  	if interceptor == nil {
1325  		return srv.(ACLServiceServer).UnbanEvent(ctx, in)
1326  	}
1327  	info := &grpc.UnaryServerInfo{
1328  		Server:     srv,
1329  		FullMethod: ACLService_UnbanEvent_FullMethodName,
1330  	}
1331  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1332  		return srv.(ACLServiceServer).UnbanEvent(ctx, req.(*EventRequest))
1333  	}
1334  	return interceptor(ctx, in, info, handler)
1335  }
1336  
1337  func _ACLService_ListBannedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1338  	in := new(Empty)
1339  	if err := dec(in); err != nil {
1340  		return nil, err
1341  	}
1342  	if interceptor == nil {
1343  		return srv.(ACLServiceServer).ListBannedEvents(ctx, in)
1344  	}
1345  	info := &grpc.UnaryServerInfo{
1346  		Server:     srv,
1347  		FullMethod: ACLService_ListBannedEvents_FullMethodName,
1348  	}
1349  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1350  		return srv.(ACLServiceServer).ListBannedEvents(ctx, req.(*Empty))
1351  	}
1352  	return interceptor(ctx, in, info, handler)
1353  }
1354  
1355  func _ACLService_AllowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1356  	in := new(BanEventRequest)
1357  	if err := dec(in); err != nil {
1358  		return nil, err
1359  	}
1360  	if interceptor == nil {
1361  		return srv.(ACLServiceServer).AllowEvent(ctx, in)
1362  	}
1363  	info := &grpc.UnaryServerInfo{
1364  		Server:     srv,
1365  		FullMethod: ACLService_AllowEvent_FullMethodName,
1366  	}
1367  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1368  		return srv.(ACLServiceServer).AllowEvent(ctx, req.(*BanEventRequest))
1369  	}
1370  	return interceptor(ctx, in, info, handler)
1371  }
1372  
1373  func _ACLService_DisallowEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1374  	in := new(EventRequest)
1375  	if err := dec(in); err != nil {
1376  		return nil, err
1377  	}
1378  	if interceptor == nil {
1379  		return srv.(ACLServiceServer).DisallowEvent(ctx, in)
1380  	}
1381  	info := &grpc.UnaryServerInfo{
1382  		Server:     srv,
1383  		FullMethod: ACLService_DisallowEvent_FullMethodName,
1384  	}
1385  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1386  		return srv.(ACLServiceServer).DisallowEvent(ctx, req.(*EventRequest))
1387  	}
1388  	return interceptor(ctx, in, info, handler)
1389  }
1390  
1391  func _ACLService_ListAllowedEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1392  	in := new(Empty)
1393  	if err := dec(in); err != nil {
1394  		return nil, err
1395  	}
1396  	if interceptor == nil {
1397  		return srv.(ACLServiceServer).ListAllowedEvents(ctx, in)
1398  	}
1399  	info := &grpc.UnaryServerInfo{
1400  		Server:     srv,
1401  		FullMethod: ACLService_ListAllowedEvents_FullMethodName,
1402  	}
1403  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1404  		return srv.(ACLServiceServer).ListAllowedEvents(ctx, req.(*Empty))
1405  	}
1406  	return interceptor(ctx, in, info, handler)
1407  }
1408  
1409  func _ACLService_BlockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1410  	in := new(BlockIPRequest)
1411  	if err := dec(in); err != nil {
1412  		return nil, err
1413  	}
1414  	if interceptor == nil {
1415  		return srv.(ACLServiceServer).BlockIP(ctx, in)
1416  	}
1417  	info := &grpc.UnaryServerInfo{
1418  		Server:     srv,
1419  		FullMethod: ACLService_BlockIP_FullMethodName,
1420  	}
1421  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1422  		return srv.(ACLServiceServer).BlockIP(ctx, req.(*BlockIPRequest))
1423  	}
1424  	return interceptor(ctx, in, info, handler)
1425  }
1426  
1427  func _ACLService_UnblockIP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1428  	in := new(IPRequest)
1429  	if err := dec(in); err != nil {
1430  		return nil, err
1431  	}
1432  	if interceptor == nil {
1433  		return srv.(ACLServiceServer).UnblockIP(ctx, in)
1434  	}
1435  	info := &grpc.UnaryServerInfo{
1436  		Server:     srv,
1437  		FullMethod: ACLService_UnblockIP_FullMethodName,
1438  	}
1439  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1440  		return srv.(ACLServiceServer).UnblockIP(ctx, req.(*IPRequest))
1441  	}
1442  	return interceptor(ctx, in, info, handler)
1443  }
1444  
1445  func _ACLService_ListBlockedIPs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1446  	in := new(Empty)
1447  	if err := dec(in); err != nil {
1448  		return nil, err
1449  	}
1450  	if interceptor == nil {
1451  		return srv.(ACLServiceServer).ListBlockedIPs(ctx, in)
1452  	}
1453  	info := &grpc.UnaryServerInfo{
1454  		Server:     srv,
1455  		FullMethod: ACLService_ListBlockedIPs_FullMethodName,
1456  	}
1457  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1458  		return srv.(ACLServiceServer).ListBlockedIPs(ctx, req.(*Empty))
1459  	}
1460  	return interceptor(ctx, in, info, handler)
1461  }
1462  
1463  func _ACLService_AllowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1464  	in := new(AllowKindRequest)
1465  	if err := dec(in); err != nil {
1466  		return nil, err
1467  	}
1468  	if interceptor == nil {
1469  		return srv.(ACLServiceServer).AllowKind(ctx, in)
1470  	}
1471  	info := &grpc.UnaryServerInfo{
1472  		Server:     srv,
1473  		FullMethod: ACLService_AllowKind_FullMethodName,
1474  	}
1475  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1476  		return srv.(ACLServiceServer).AllowKind(ctx, req.(*AllowKindRequest))
1477  	}
1478  	return interceptor(ctx, in, info, handler)
1479  }
1480  
1481  func _ACLService_DisallowKind_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1482  	in := new(KindRequest)
1483  	if err := dec(in); err != nil {
1484  		return nil, err
1485  	}
1486  	if interceptor == nil {
1487  		return srv.(ACLServiceServer).DisallowKind(ctx, in)
1488  	}
1489  	info := &grpc.UnaryServerInfo{
1490  		Server:     srv,
1491  		FullMethod: ACLService_DisallowKind_FullMethodName,
1492  	}
1493  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1494  		return srv.(ACLServiceServer).DisallowKind(ctx, req.(*KindRequest))
1495  	}
1496  	return interceptor(ctx, in, info, handler)
1497  }
1498  
1499  func _ACLService_ListAllowedKinds_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1500  	in := new(Empty)
1501  	if err := dec(in); err != nil {
1502  		return nil, err
1503  	}
1504  	if interceptor == nil {
1505  		return srv.(ACLServiceServer).ListAllowedKinds(ctx, in)
1506  	}
1507  	info := &grpc.UnaryServerInfo{
1508  		Server:     srv,
1509  		FullMethod: ACLService_ListAllowedKinds_FullMethodName,
1510  	}
1511  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1512  		return srv.(ACLServiceServer).ListAllowedKinds(ctx, req.(*Empty))
1513  	}
1514  	return interceptor(ctx, in, info, handler)
1515  }
1516  
1517  func _ACLService_UpdatePeerAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1518  	in := new(UpdatePeerAdminsRequest)
1519  	if err := dec(in); err != nil {
1520  		return nil, err
1521  	}
1522  	if interceptor == nil {
1523  		return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, in)
1524  	}
1525  	info := &grpc.UnaryServerInfo{
1526  		Server:     srv,
1527  		FullMethod: ACLService_UpdatePeerAdmins_FullMethodName,
1528  	}
1529  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1530  		return srv.(ACLServiceServer).UpdatePeerAdmins(ctx, req.(*UpdatePeerAdminsRequest))
1531  	}
1532  	return interceptor(ctx, in, info, handler)
1533  }
1534  
1535  func _ACLService_TrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1536  	in := new(TrustPubkeyRequest)
1537  	if err := dec(in); err != nil {
1538  		return nil, err
1539  	}
1540  	if interceptor == nil {
1541  		return srv.(ACLServiceServer).TrustPubkey(ctx, in)
1542  	}
1543  	info := &grpc.UnaryServerInfo{
1544  		Server:     srv,
1545  		FullMethod: ACLService_TrustPubkey_FullMethodName,
1546  	}
1547  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1548  		return srv.(ACLServiceServer).TrustPubkey(ctx, req.(*TrustPubkeyRequest))
1549  	}
1550  	return interceptor(ctx, in, info, handler)
1551  }
1552  
1553  func _ACLService_UntrustPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1554  	in := new(PubkeyRequest)
1555  	if err := dec(in); err != nil {
1556  		return nil, err
1557  	}
1558  	if interceptor == nil {
1559  		return srv.(ACLServiceServer).UntrustPubkey(ctx, in)
1560  	}
1561  	info := &grpc.UnaryServerInfo{
1562  		Server:     srv,
1563  		FullMethod: ACLService_UntrustPubkey_FullMethodName,
1564  	}
1565  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1566  		return srv.(ACLServiceServer).UntrustPubkey(ctx, req.(*PubkeyRequest))
1567  	}
1568  	return interceptor(ctx, in, info, handler)
1569  }
1570  
1571  func _ACLService_ListTrustedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1572  	in := new(Empty)
1573  	if err := dec(in); err != nil {
1574  		return nil, err
1575  	}
1576  	if interceptor == nil {
1577  		return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, in)
1578  	}
1579  	info := &grpc.UnaryServerInfo{
1580  		Server:     srv,
1581  		FullMethod: ACLService_ListTrustedPubkeys_FullMethodName,
1582  	}
1583  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1584  		return srv.(ACLServiceServer).ListTrustedPubkeys(ctx, req.(*Empty))
1585  	}
1586  	return interceptor(ctx, in, info, handler)
1587  }
1588  
1589  func _ACLService_BlacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1590  	in := new(BlacklistPubkeyRequest)
1591  	if err := dec(in); err != nil {
1592  		return nil, err
1593  	}
1594  	if interceptor == nil {
1595  		return srv.(ACLServiceServer).BlacklistPubkey(ctx, in)
1596  	}
1597  	info := &grpc.UnaryServerInfo{
1598  		Server:     srv,
1599  		FullMethod: ACLService_BlacklistPubkey_FullMethodName,
1600  	}
1601  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1602  		return srv.(ACLServiceServer).BlacklistPubkey(ctx, req.(*BlacklistPubkeyRequest))
1603  	}
1604  	return interceptor(ctx, in, info, handler)
1605  }
1606  
1607  func _ACLService_UnblacklistPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1608  	in := new(PubkeyRequest)
1609  	if err := dec(in); err != nil {
1610  		return nil, err
1611  	}
1612  	if interceptor == nil {
1613  		return srv.(ACLServiceServer).UnblacklistPubkey(ctx, in)
1614  	}
1615  	info := &grpc.UnaryServerInfo{
1616  		Server:     srv,
1617  		FullMethod: ACLService_UnblacklistPubkey_FullMethodName,
1618  	}
1619  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1620  		return srv.(ACLServiceServer).UnblacklistPubkey(ctx, req.(*PubkeyRequest))
1621  	}
1622  	return interceptor(ctx, in, info, handler)
1623  }
1624  
1625  func _ACLService_ListBlacklistedPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1626  	in := new(Empty)
1627  	if err := dec(in); err != nil {
1628  		return nil, err
1629  	}
1630  	if interceptor == nil {
1631  		return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, in)
1632  	}
1633  	info := &grpc.UnaryServerInfo{
1634  		Server:     srv,
1635  		FullMethod: ACLService_ListBlacklistedPubkeys_FullMethodName,
1636  	}
1637  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1638  		return srv.(ACLServiceServer).ListBlacklistedPubkeys(ctx, req.(*Empty))
1639  	}
1640  	return interceptor(ctx, in, info, handler)
1641  }
1642  
1643  func _ACLService_MarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1644  	in := new(MarkSpamRequest)
1645  	if err := dec(in); err != nil {
1646  		return nil, err
1647  	}
1648  	if interceptor == nil {
1649  		return srv.(ACLServiceServer).MarkSpam(ctx, in)
1650  	}
1651  	info := &grpc.UnaryServerInfo{
1652  		Server:     srv,
1653  		FullMethod: ACLService_MarkSpam_FullMethodName,
1654  	}
1655  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1656  		return srv.(ACLServiceServer).MarkSpam(ctx, req.(*MarkSpamRequest))
1657  	}
1658  	return interceptor(ctx, in, info, handler)
1659  }
1660  
1661  func _ACLService_UnmarkSpam_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1662  	in := new(EventRequest)
1663  	if err := dec(in); err != nil {
1664  		return nil, err
1665  	}
1666  	if interceptor == nil {
1667  		return srv.(ACLServiceServer).UnmarkSpam(ctx, in)
1668  	}
1669  	info := &grpc.UnaryServerInfo{
1670  		Server:     srv,
1671  		FullMethod: ACLService_UnmarkSpam_FullMethodName,
1672  	}
1673  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1674  		return srv.(ACLServiceServer).UnmarkSpam(ctx, req.(*EventRequest))
1675  	}
1676  	return interceptor(ctx, in, info, handler)
1677  }
1678  
1679  func _ACLService_ListSpamEvents_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1680  	in := new(Empty)
1681  	if err := dec(in); err != nil {
1682  		return nil, err
1683  	}
1684  	if interceptor == nil {
1685  		return srv.(ACLServiceServer).ListSpamEvents(ctx, in)
1686  	}
1687  	info := &grpc.UnaryServerInfo{
1688  		Server:     srv,
1689  		FullMethod: ACLService_ListSpamEvents_FullMethodName,
1690  	}
1691  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1692  		return srv.(ACLServiceServer).ListSpamEvents(ctx, req.(*Empty))
1693  	}
1694  	return interceptor(ctx, in, info, handler)
1695  }
1696  
1697  func _ACLService_RateLimitCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1698  	in := new(RateLimitCheckRequest)
1699  	if err := dec(in); err != nil {
1700  		return nil, err
1701  	}
1702  	if interceptor == nil {
1703  		return srv.(ACLServiceServer).RateLimitCheck(ctx, in)
1704  	}
1705  	info := &grpc.UnaryServerInfo{
1706  		Server:     srv,
1707  		FullMethod: ACLService_RateLimitCheck_FullMethodName,
1708  	}
1709  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1710  		return srv.(ACLServiceServer).RateLimitCheck(ctx, req.(*RateLimitCheckRequest))
1711  	}
1712  	return interceptor(ctx, in, info, handler)
1713  }
1714  
1715  func _ACLService_ProcessConfigEvent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1716  	in := new(ConfigEventRequest)
1717  	if err := dec(in); err != nil {
1718  		return nil, err
1719  	}
1720  	if interceptor == nil {
1721  		return srv.(ACLServiceServer).ProcessConfigEvent(ctx, in)
1722  	}
1723  	info := &grpc.UnaryServerInfo{
1724  		Server:     srv,
1725  		FullMethod: ACLService_ProcessConfigEvent_FullMethodName,
1726  	}
1727  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1728  		return srv.(ACLServiceServer).ProcessConfigEvent(ctx, req.(*ConfigEventRequest))
1729  	}
1730  	return interceptor(ctx, in, info, handler)
1731  }
1732  
1733  func _ACLService_GetCuratingConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1734  	in := new(Empty)
1735  	if err := dec(in); err != nil {
1736  		return nil, err
1737  	}
1738  	if interceptor == nil {
1739  		return srv.(ACLServiceServer).GetCuratingConfig(ctx, in)
1740  	}
1741  	info := &grpc.UnaryServerInfo{
1742  		Server:     srv,
1743  		FullMethod: ACLService_GetCuratingConfig_FullMethodName,
1744  	}
1745  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1746  		return srv.(ACLServiceServer).GetCuratingConfig(ctx, req.(*Empty))
1747  	}
1748  	return interceptor(ctx, in, info, handler)
1749  }
1750  
1751  func _ACLService_IsCuratingConfigured_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1752  	in := new(Empty)
1753  	if err := dec(in); err != nil {
1754  		return nil, err
1755  	}
1756  	if interceptor == nil {
1757  		return srv.(ACLServiceServer).IsCuratingConfigured(ctx, in)
1758  	}
1759  	info := &grpc.UnaryServerInfo{
1760  		Server:     srv,
1761  		FullMethod: ACLService_IsCuratingConfigured_FullMethodName,
1762  	}
1763  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1764  		return srv.(ACLServiceServer).IsCuratingConfigured(ctx, req.(*Empty))
1765  	}
1766  	return interceptor(ctx, in, info, handler)
1767  }
1768  
1769  func _ACLService_ListUnclassifiedUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1770  	in := new(PaginationRequest)
1771  	if err := dec(in); err != nil {
1772  		return nil, err
1773  	}
1774  	if interceptor == nil {
1775  		return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, in)
1776  	}
1777  	info := &grpc.UnaryServerInfo{
1778  		Server:     srv,
1779  		FullMethod: ACLService_ListUnclassifiedUsers_FullMethodName,
1780  	}
1781  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1782  		return srv.(ACLServiceServer).ListUnclassifiedUsers(ctx, req.(*PaginationRequest))
1783  	}
1784  	return interceptor(ctx, in, info, handler)
1785  }
1786  
1787  func _ACLService_GetEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1788  	in := new(GetEventsForPubkeyRequest)
1789  	if err := dec(in); err != nil {
1790  		return nil, err
1791  	}
1792  	if interceptor == nil {
1793  		return srv.(ACLServiceServer).GetEventsForPubkey(ctx, in)
1794  	}
1795  	info := &grpc.UnaryServerInfo{
1796  		Server:     srv,
1797  		FullMethod: ACLService_GetEventsForPubkey_FullMethodName,
1798  	}
1799  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1800  		return srv.(ACLServiceServer).GetEventsForPubkey(ctx, req.(*GetEventsForPubkeyRequest))
1801  	}
1802  	return interceptor(ctx, in, info, handler)
1803  }
1804  
1805  func _ACLService_DeleteEventsForPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1806  	in := new(DeleteEventsForPubkeyRequest)
1807  	if err := dec(in); err != nil {
1808  		return nil, err
1809  	}
1810  	if interceptor == nil {
1811  		return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, in)
1812  	}
1813  	info := &grpc.UnaryServerInfo{
1814  		Server:     srv,
1815  		FullMethod: ACLService_DeleteEventsForPubkey_FullMethodName,
1816  	}
1817  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1818  		return srv.(ACLServiceServer).DeleteEventsForPubkey(ctx, req.(*DeleteEventsForPubkeyRequest))
1819  	}
1820  	return interceptor(ctx, in, info, handler)
1821  }
1822  
1823  func _ACLService_ScanAllPubkeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1824  	in := new(Empty)
1825  	if err := dec(in); err != nil {
1826  		return nil, err
1827  	}
1828  	if interceptor == nil {
1829  		return srv.(ACLServiceServer).ScanAllPubkeys(ctx, in)
1830  	}
1831  	info := &grpc.UnaryServerInfo{
1832  		Server:     srv,
1833  		FullMethod: ACLService_ScanAllPubkeys_FullMethodName,
1834  	}
1835  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1836  		return srv.(ACLServiceServer).ScanAllPubkeys(ctx, req.(*Empty))
1837  	}
1838  	return interceptor(ctx, in, info, handler)
1839  }
1840  
1841  func _ACLService_SubscribePubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1842  	in := new(SubscribeRequest)
1843  	if err := dec(in); err != nil {
1844  		return nil, err
1845  	}
1846  	if interceptor == nil {
1847  		return srv.(ACLServiceServer).SubscribePubkey(ctx, in)
1848  	}
1849  	info := &grpc.UnaryServerInfo{
1850  		Server:     srv,
1851  		FullMethod: ACLService_SubscribePubkey_FullMethodName,
1852  	}
1853  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1854  		return srv.(ACLServiceServer).SubscribePubkey(ctx, req.(*SubscribeRequest))
1855  	}
1856  	return interceptor(ctx, in, info, handler)
1857  }
1858  
1859  func _ACLService_UnsubscribePubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1860  	in := new(PubkeyRequest)
1861  	if err := dec(in); err != nil {
1862  		return nil, err
1863  	}
1864  	if interceptor == nil {
1865  		return srv.(ACLServiceServer).UnsubscribePubkey(ctx, in)
1866  	}
1867  	info := &grpc.UnaryServerInfo{
1868  		Server:     srv,
1869  		FullMethod: ACLService_UnsubscribePubkey_FullMethodName,
1870  	}
1871  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1872  		return srv.(ACLServiceServer).UnsubscribePubkey(ctx, req.(*PubkeyRequest))
1873  	}
1874  	return interceptor(ctx, in, info, handler)
1875  }
1876  
1877  func _ACLService_IsSubscribed_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1878  	in := new(PubkeyRequest)
1879  	if err := dec(in); err != nil {
1880  		return nil, err
1881  	}
1882  	if interceptor == nil {
1883  		return srv.(ACLServiceServer).IsSubscribed(ctx, in)
1884  	}
1885  	info := &grpc.UnaryServerInfo{
1886  		Server:     srv,
1887  		FullMethod: ACLService_IsSubscribed_FullMethodName,
1888  	}
1889  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1890  		return srv.(ACLServiceServer).IsSubscribed(ctx, req.(*PubkeyRequest))
1891  	}
1892  	return interceptor(ctx, in, info, handler)
1893  }
1894  
1895  func _ACLService_GetSubscription_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1896  	in := new(PubkeyRequest)
1897  	if err := dec(in); err != nil {
1898  		return nil, err
1899  	}
1900  	if interceptor == nil {
1901  		return srv.(ACLServiceServer).GetSubscription(ctx, in)
1902  	}
1903  	info := &grpc.UnaryServerInfo{
1904  		Server:     srv,
1905  		FullMethod: ACLService_GetSubscription_FullMethodName,
1906  	}
1907  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1908  		return srv.(ACLServiceServer).GetSubscription(ctx, req.(*PubkeyRequest))
1909  	}
1910  	return interceptor(ctx, in, info, handler)
1911  }
1912  
1913  func _ACLService_ClaimAlias_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1914  	in := new(ClaimAliasRequest)
1915  	if err := dec(in); err != nil {
1916  		return nil, err
1917  	}
1918  	if interceptor == nil {
1919  		return srv.(ACLServiceServer).ClaimAlias(ctx, in)
1920  	}
1921  	info := &grpc.UnaryServerInfo{
1922  		Server:     srv,
1923  		FullMethod: ACLService_ClaimAlias_FullMethodName,
1924  	}
1925  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1926  		return srv.(ACLServiceServer).ClaimAlias(ctx, req.(*ClaimAliasRequest))
1927  	}
1928  	return interceptor(ctx, in, info, handler)
1929  }
1930  
1931  func _ACLService_GetAliasByPubkey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1932  	in := new(PubkeyRequest)
1933  	if err := dec(in); err != nil {
1934  		return nil, err
1935  	}
1936  	if interceptor == nil {
1937  		return srv.(ACLServiceServer).GetAliasByPubkey(ctx, in)
1938  	}
1939  	info := &grpc.UnaryServerInfo{
1940  		Server:     srv,
1941  		FullMethod: ACLService_GetAliasByPubkey_FullMethodName,
1942  	}
1943  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1944  		return srv.(ACLServiceServer).GetAliasByPubkey(ctx, req.(*PubkeyRequest))
1945  	}
1946  	return interceptor(ctx, in, info, handler)
1947  }
1948  
1949  func _ACLService_GetPubkeyByAlias_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1950  	in := new(AliasRequest)
1951  	if err := dec(in); err != nil {
1952  		return nil, err
1953  	}
1954  	if interceptor == nil {
1955  		return srv.(ACLServiceServer).GetPubkeyByAlias(ctx, in)
1956  	}
1957  	info := &grpc.UnaryServerInfo{
1958  		Server:     srv,
1959  		FullMethod: ACLService_GetPubkeyByAlias_FullMethodName,
1960  	}
1961  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1962  		return srv.(ACLServiceServer).GetPubkeyByAlias(ctx, req.(*AliasRequest))
1963  	}
1964  	return interceptor(ctx, in, info, handler)
1965  }
1966  
1967  func _ACLService_IsAliasTaken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1968  	in := new(AliasRequest)
1969  	if err := dec(in); err != nil {
1970  		return nil, err
1971  	}
1972  	if interceptor == nil {
1973  		return srv.(ACLServiceServer).IsAliasTaken(ctx, in)
1974  	}
1975  	info := &grpc.UnaryServerInfo{
1976  		Server:     srv,
1977  		FullMethod: ACLService_IsAliasTaken_FullMethodName,
1978  	}
1979  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1980  		return srv.(ACLServiceServer).IsAliasTaken(ctx, req.(*AliasRequest))
1981  	}
1982  	return interceptor(ctx, in, info, handler)
1983  }
1984  
1985  // ACLService_ServiceDesc is the grpc.ServiceDesc for ACLService service.
1986  // It's only intended for direct use with grpc.RegisterService,
1987  // and not to be introspected or modified (even as a copy)
1988  var ACLService_ServiceDesc = grpc.ServiceDesc{
1989  	ServiceName: "orlyacl.v1.ACLService",
1990  	HandlerType: (*ACLServiceServer)(nil),
1991  	Methods: []grpc.MethodDesc{
1992  		{
1993  			MethodName: "GetAccessLevel",
1994  			Handler:    _ACLService_GetAccessLevel_Handler,
1995  		},
1996  		{
1997  			MethodName: "CheckPolicy",
1998  			Handler:    _ACLService_CheckPolicy_Handler,
1999  		},
2000  		{
2001  			MethodName: "GetACLInfo",
2002  			Handler:    _ACLService_GetACLInfo_Handler,
2003  		},
2004  		{
2005  			MethodName: "GetMode",
2006  			Handler:    _ACLService_GetMode_Handler,
2007  		},
2008  		{
2009  			MethodName: "Ready",
2010  			Handler:    _ACLService_Ready_Handler,
2011  		},
2012  		{
2013  			MethodName: "GetThrottleDelay",
2014  			Handler:    _ACLService_GetThrottleDelay_Handler,
2015  		},
2016  		{
2017  			MethodName: "AddFollow",
2018  			Handler:    _ACLService_AddFollow_Handler,
2019  		},
2020  		{
2021  			MethodName: "GetFollowedPubkeys",
2022  			Handler:    _ACLService_GetFollowedPubkeys_Handler,
2023  		},
2024  		{
2025  			MethodName: "GetAdminRelays",
2026  			Handler:    _ACLService_GetAdminRelays_Handler,
2027  		},
2028  		{
2029  			MethodName: "BanPubkey",
2030  			Handler:    _ACLService_BanPubkey_Handler,
2031  		},
2032  		{
2033  			MethodName: "UnbanPubkey",
2034  			Handler:    _ACLService_UnbanPubkey_Handler,
2035  		},
2036  		{
2037  			MethodName: "ListBannedPubkeys",
2038  			Handler:    _ACLService_ListBannedPubkeys_Handler,
2039  		},
2040  		{
2041  			MethodName: "AllowPubkey",
2042  			Handler:    _ACLService_AllowPubkey_Handler,
2043  		},
2044  		{
2045  			MethodName: "DisallowPubkey",
2046  			Handler:    _ACLService_DisallowPubkey_Handler,
2047  		},
2048  		{
2049  			MethodName: "ListAllowedPubkeys",
2050  			Handler:    _ACLService_ListAllowedPubkeys_Handler,
2051  		},
2052  		{
2053  			MethodName: "BanEvent",
2054  			Handler:    _ACLService_BanEvent_Handler,
2055  		},
2056  		{
2057  			MethodName: "UnbanEvent",
2058  			Handler:    _ACLService_UnbanEvent_Handler,
2059  		},
2060  		{
2061  			MethodName: "ListBannedEvents",
2062  			Handler:    _ACLService_ListBannedEvents_Handler,
2063  		},
2064  		{
2065  			MethodName: "AllowEvent",
2066  			Handler:    _ACLService_AllowEvent_Handler,
2067  		},
2068  		{
2069  			MethodName: "DisallowEvent",
2070  			Handler:    _ACLService_DisallowEvent_Handler,
2071  		},
2072  		{
2073  			MethodName: "ListAllowedEvents",
2074  			Handler:    _ACLService_ListAllowedEvents_Handler,
2075  		},
2076  		{
2077  			MethodName: "BlockIP",
2078  			Handler:    _ACLService_BlockIP_Handler,
2079  		},
2080  		{
2081  			MethodName: "UnblockIP",
2082  			Handler:    _ACLService_UnblockIP_Handler,
2083  		},
2084  		{
2085  			MethodName: "ListBlockedIPs",
2086  			Handler:    _ACLService_ListBlockedIPs_Handler,
2087  		},
2088  		{
2089  			MethodName: "AllowKind",
2090  			Handler:    _ACLService_AllowKind_Handler,
2091  		},
2092  		{
2093  			MethodName: "DisallowKind",
2094  			Handler:    _ACLService_DisallowKind_Handler,
2095  		},
2096  		{
2097  			MethodName: "ListAllowedKinds",
2098  			Handler:    _ACLService_ListAllowedKinds_Handler,
2099  		},
2100  		{
2101  			MethodName: "UpdatePeerAdmins",
2102  			Handler:    _ACLService_UpdatePeerAdmins_Handler,
2103  		},
2104  		{
2105  			MethodName: "TrustPubkey",
2106  			Handler:    _ACLService_TrustPubkey_Handler,
2107  		},
2108  		{
2109  			MethodName: "UntrustPubkey",
2110  			Handler:    _ACLService_UntrustPubkey_Handler,
2111  		},
2112  		{
2113  			MethodName: "ListTrustedPubkeys",
2114  			Handler:    _ACLService_ListTrustedPubkeys_Handler,
2115  		},
2116  		{
2117  			MethodName: "BlacklistPubkey",
2118  			Handler:    _ACLService_BlacklistPubkey_Handler,
2119  		},
2120  		{
2121  			MethodName: "UnblacklistPubkey",
2122  			Handler:    _ACLService_UnblacklistPubkey_Handler,
2123  		},
2124  		{
2125  			MethodName: "ListBlacklistedPubkeys",
2126  			Handler:    _ACLService_ListBlacklistedPubkeys_Handler,
2127  		},
2128  		{
2129  			MethodName: "MarkSpam",
2130  			Handler:    _ACLService_MarkSpam_Handler,
2131  		},
2132  		{
2133  			MethodName: "UnmarkSpam",
2134  			Handler:    _ACLService_UnmarkSpam_Handler,
2135  		},
2136  		{
2137  			MethodName: "ListSpamEvents",
2138  			Handler:    _ACLService_ListSpamEvents_Handler,
2139  		},
2140  		{
2141  			MethodName: "RateLimitCheck",
2142  			Handler:    _ACLService_RateLimitCheck_Handler,
2143  		},
2144  		{
2145  			MethodName: "ProcessConfigEvent",
2146  			Handler:    _ACLService_ProcessConfigEvent_Handler,
2147  		},
2148  		{
2149  			MethodName: "GetCuratingConfig",
2150  			Handler:    _ACLService_GetCuratingConfig_Handler,
2151  		},
2152  		{
2153  			MethodName: "IsCuratingConfigured",
2154  			Handler:    _ACLService_IsCuratingConfigured_Handler,
2155  		},
2156  		{
2157  			MethodName: "ListUnclassifiedUsers",
2158  			Handler:    _ACLService_ListUnclassifiedUsers_Handler,
2159  		},
2160  		{
2161  			MethodName: "GetEventsForPubkey",
2162  			Handler:    _ACLService_GetEventsForPubkey_Handler,
2163  		},
2164  		{
2165  			MethodName: "DeleteEventsForPubkey",
2166  			Handler:    _ACLService_DeleteEventsForPubkey_Handler,
2167  		},
2168  		{
2169  			MethodName: "ScanAllPubkeys",
2170  			Handler:    _ACLService_ScanAllPubkeys_Handler,
2171  		},
2172  		{
2173  			MethodName: "SubscribePubkey",
2174  			Handler:    _ACLService_SubscribePubkey_Handler,
2175  		},
2176  		{
2177  			MethodName: "UnsubscribePubkey",
2178  			Handler:    _ACLService_UnsubscribePubkey_Handler,
2179  		},
2180  		{
2181  			MethodName: "IsSubscribed",
2182  			Handler:    _ACLService_IsSubscribed_Handler,
2183  		},
2184  		{
2185  			MethodName: "GetSubscription",
2186  			Handler:    _ACLService_GetSubscription_Handler,
2187  		},
2188  		{
2189  			MethodName: "ClaimAlias",
2190  			Handler:    _ACLService_ClaimAlias_Handler,
2191  		},
2192  		{
2193  			MethodName: "GetAliasByPubkey",
2194  			Handler:    _ACLService_GetAliasByPubkey_Handler,
2195  		},
2196  		{
2197  			MethodName: "GetPubkeyByAlias",
2198  			Handler:    _ACLService_GetPubkeyByAlias_Handler,
2199  		},
2200  		{
2201  			MethodName: "IsAliasTaken",
2202  			Handler:    _ACLService_IsAliasTaken_Handler,
2203  		},
2204  	},
2205  	Streams:  []grpc.StreamDesc{},
2206  	Metadata: "orlyacl/v1/acl.proto",
2207  }
2208