github.com/TrueCloudLab/frostfs-api-go/v2@v2.0.0-20230228134343-196241c4e79a/container/grpc/service_grpc.pb.go (about) 1 // Code generated by protoc-gen-go-grpc. DO NOT EDIT. 2 // versions: 3 // - protoc-gen-go-grpc v1.2.0 4 // - protoc v3.21.9 5 // source: container/grpc/service.proto 6 7 package container 8 9 import ( 10 context "context" 11 grpc "google.golang.org/grpc" 12 codes "google.golang.org/grpc/codes" 13 status "google.golang.org/grpc/status" 14 ) 15 16 // This is a compile-time assertion to ensure that this generated file 17 // is compatible with the grpc package it is being compiled against. 18 // Requires gRPC-Go v1.32.0 or later. 19 const _ = grpc.SupportPackageIsVersion7 20 21 // ContainerServiceClient is the client API for ContainerService service. 22 // 23 // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream. 24 type ContainerServiceClient interface { 25 // `Put` invokes `Container` smart contract's `Put` method and returns 26 // response immediately. After a new block is issued in sidechain, request is 27 // verified by Inner Ring nodes. After one more block in sidechain, the container 28 // is added into smart contract storage. 29 // 30 // Statuses: 31 // - **OK** (0, SECTION_SUCCESS): \ 32 // request to save the container has been sent to the sidechain; 33 // - Common failures (SECTION_FAILURE_COMMON). 34 Put(ctx context.Context, in *PutRequest, opts ...grpc.CallOption) (*PutResponse, error) 35 // `Delete` invokes `Container` smart contract's `Delete` method and returns 36 // response immediately. After a new block is issued in sidechain, request is 37 // verified by Inner Ring nodes. After one more block in sidechain, the container 38 // is added into smart contract storage. 39 // 40 // Statuses: 41 // - **OK** (0, SECTION_SUCCESS): \ 42 // request to remove the container has been sent to the sidechain; 43 // - Common failures (SECTION_FAILURE_COMMON). 44 Delete(ctx context.Context, in *DeleteRequest, opts ...grpc.CallOption) (*DeleteResponse, error) 45 // Returns container structure from `Container` smart contract storage. 46 // 47 // Statuses: 48 // - **OK** (0, SECTION_SUCCESS): \ 49 // container has been successfully read; 50 // - Common failures (SECTION_FAILURE_COMMON); 51 // - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \ 52 // requested container not found. 53 Get(ctx context.Context, in *GetRequest, opts ...grpc.CallOption) (*GetResponse, error) 54 // Returns all owner's containers from 'Container` smart contract' storage. 55 // 56 // Statuses: 57 // - **OK** (0, SECTION_SUCCESS): \ 58 // container list has been successfully read; 59 // - Common failures (SECTION_FAILURE_COMMON). 60 List(ctx context.Context, in *ListRequest, opts ...grpc.CallOption) (*ListResponse, error) 61 // Invokes 'SetEACL' method of 'Container` smart contract and returns response 62 // immediately. After one more block in sidechain, changes in an Extended ACL are 63 // added into smart contract storage. 64 // 65 // Statuses: 66 // - **OK** (0, SECTION_SUCCESS): \ 67 // request to save container eACL has been sent to the sidechain; 68 // - Common failures (SECTION_FAILURE_COMMON). 69 SetExtendedACL(ctx context.Context, in *SetExtendedACLRequest, opts ...grpc.CallOption) (*SetExtendedACLResponse, error) 70 // Returns Extended ACL table and signature from `Container` smart contract 71 // storage. 72 // 73 // Statuses: 74 // - **OK** (0, SECTION_SUCCESS): \ 75 // container eACL has been successfully read; 76 // - Common failures (SECTION_FAILURE_COMMON); 77 // - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \ 78 // container not found; 79 // - **EACL_NOT_FOUND** (3073, SECTION_CONTAINER): \ 80 // eACL table not found. 81 GetExtendedACL(ctx context.Context, in *GetExtendedACLRequest, opts ...grpc.CallOption) (*GetExtendedACLResponse, error) 82 // Announces the space values used by the container for P2P synchronization. 83 // 84 // Statuses: 85 // - **OK** (0, SECTION_SUCCESS): \ 86 // estimation of used space has been successfully announced; 87 // - Common failures (SECTION_FAILURE_COMMON). 88 AnnounceUsedSpace(ctx context.Context, in *AnnounceUsedSpaceRequest, opts ...grpc.CallOption) (*AnnounceUsedSpaceResponse, error) 89 } 90 91 type containerServiceClient struct { 92 cc grpc.ClientConnInterface 93 } 94 95 func NewContainerServiceClient(cc grpc.ClientConnInterface) ContainerServiceClient { 96 return &containerServiceClient{cc} 97 } 98 99 func (c *containerServiceClient) Put(ctx context.Context, in *PutRequest, opts ...grpc.CallOption) (*PutResponse, error) { 100 out := new(PutResponse) 101 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Put", in, out, opts...) 102 if err != nil { 103 return nil, err 104 } 105 return out, nil 106 } 107 108 func (c *containerServiceClient) Delete(ctx context.Context, in *DeleteRequest, opts ...grpc.CallOption) (*DeleteResponse, error) { 109 out := new(DeleteResponse) 110 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Delete", in, out, opts...) 111 if err != nil { 112 return nil, err 113 } 114 return out, nil 115 } 116 117 func (c *containerServiceClient) Get(ctx context.Context, in *GetRequest, opts ...grpc.CallOption) (*GetResponse, error) { 118 out := new(GetResponse) 119 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Get", in, out, opts...) 120 if err != nil { 121 return nil, err 122 } 123 return out, nil 124 } 125 126 func (c *containerServiceClient) List(ctx context.Context, in *ListRequest, opts ...grpc.CallOption) (*ListResponse, error) { 127 out := new(ListResponse) 128 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/List", in, out, opts...) 129 if err != nil { 130 return nil, err 131 } 132 return out, nil 133 } 134 135 func (c *containerServiceClient) SetExtendedACL(ctx context.Context, in *SetExtendedACLRequest, opts ...grpc.CallOption) (*SetExtendedACLResponse, error) { 136 out := new(SetExtendedACLResponse) 137 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/SetExtendedACL", in, out, opts...) 138 if err != nil { 139 return nil, err 140 } 141 return out, nil 142 } 143 144 func (c *containerServiceClient) GetExtendedACL(ctx context.Context, in *GetExtendedACLRequest, opts ...grpc.CallOption) (*GetExtendedACLResponse, error) { 145 out := new(GetExtendedACLResponse) 146 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/GetExtendedACL", in, out, opts...) 147 if err != nil { 148 return nil, err 149 } 150 return out, nil 151 } 152 153 func (c *containerServiceClient) AnnounceUsedSpace(ctx context.Context, in *AnnounceUsedSpaceRequest, opts ...grpc.CallOption) (*AnnounceUsedSpaceResponse, error) { 154 out := new(AnnounceUsedSpaceResponse) 155 err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/AnnounceUsedSpace", in, out, opts...) 156 if err != nil { 157 return nil, err 158 } 159 return out, nil 160 } 161 162 // ContainerServiceServer is the server API for ContainerService service. 163 // All implementations should embed UnimplementedContainerServiceServer 164 // for forward compatibility 165 type ContainerServiceServer interface { 166 // `Put` invokes `Container` smart contract's `Put` method and returns 167 // response immediately. After a new block is issued in sidechain, request is 168 // verified by Inner Ring nodes. After one more block in sidechain, the container 169 // is added into smart contract storage. 170 // 171 // Statuses: 172 // - **OK** (0, SECTION_SUCCESS): \ 173 // request to save the container has been sent to the sidechain; 174 // - Common failures (SECTION_FAILURE_COMMON). 175 Put(context.Context, *PutRequest) (*PutResponse, error) 176 // `Delete` invokes `Container` smart contract's `Delete` method and returns 177 // response immediately. After a new block is issued in sidechain, request is 178 // verified by Inner Ring nodes. After one more block in sidechain, the container 179 // is added into smart contract storage. 180 // 181 // Statuses: 182 // - **OK** (0, SECTION_SUCCESS): \ 183 // request to remove the container has been sent to the sidechain; 184 // - Common failures (SECTION_FAILURE_COMMON). 185 Delete(context.Context, *DeleteRequest) (*DeleteResponse, error) 186 // Returns container structure from `Container` smart contract storage. 187 // 188 // Statuses: 189 // - **OK** (0, SECTION_SUCCESS): \ 190 // container has been successfully read; 191 // - Common failures (SECTION_FAILURE_COMMON); 192 // - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \ 193 // requested container not found. 194 Get(context.Context, *GetRequest) (*GetResponse, error) 195 // Returns all owner's containers from 'Container` smart contract' storage. 196 // 197 // Statuses: 198 // - **OK** (0, SECTION_SUCCESS): \ 199 // container list has been successfully read; 200 // - Common failures (SECTION_FAILURE_COMMON). 201 List(context.Context, *ListRequest) (*ListResponse, error) 202 // Invokes 'SetEACL' method of 'Container` smart contract and returns response 203 // immediately. After one more block in sidechain, changes in an Extended ACL are 204 // added into smart contract storage. 205 // 206 // Statuses: 207 // - **OK** (0, SECTION_SUCCESS): \ 208 // request to save container eACL has been sent to the sidechain; 209 // - Common failures (SECTION_FAILURE_COMMON). 210 SetExtendedACL(context.Context, *SetExtendedACLRequest) (*SetExtendedACLResponse, error) 211 // Returns Extended ACL table and signature from `Container` smart contract 212 // storage. 213 // 214 // Statuses: 215 // - **OK** (0, SECTION_SUCCESS): \ 216 // container eACL has been successfully read; 217 // - Common failures (SECTION_FAILURE_COMMON); 218 // - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \ 219 // container not found; 220 // - **EACL_NOT_FOUND** (3073, SECTION_CONTAINER): \ 221 // eACL table not found. 222 GetExtendedACL(context.Context, *GetExtendedACLRequest) (*GetExtendedACLResponse, error) 223 // Announces the space values used by the container for P2P synchronization. 224 // 225 // Statuses: 226 // - **OK** (0, SECTION_SUCCESS): \ 227 // estimation of used space has been successfully announced; 228 // - Common failures (SECTION_FAILURE_COMMON). 229 AnnounceUsedSpace(context.Context, *AnnounceUsedSpaceRequest) (*AnnounceUsedSpaceResponse, error) 230 } 231 232 // UnimplementedContainerServiceServer should be embedded to have forward compatible implementations. 233 type UnimplementedContainerServiceServer struct { 234 } 235 236 func (UnimplementedContainerServiceServer) Put(context.Context, *PutRequest) (*PutResponse, error) { 237 return nil, status.Errorf(codes.Unimplemented, "method Put not implemented") 238 } 239 func (UnimplementedContainerServiceServer) Delete(context.Context, *DeleteRequest) (*DeleteResponse, error) { 240 return nil, status.Errorf(codes.Unimplemented, "method Delete not implemented") 241 } 242 func (UnimplementedContainerServiceServer) Get(context.Context, *GetRequest) (*GetResponse, error) { 243 return nil, status.Errorf(codes.Unimplemented, "method Get not implemented") 244 } 245 func (UnimplementedContainerServiceServer) List(context.Context, *ListRequest) (*ListResponse, error) { 246 return nil, status.Errorf(codes.Unimplemented, "method List not implemented") 247 } 248 func (UnimplementedContainerServiceServer) SetExtendedACL(context.Context, *SetExtendedACLRequest) (*SetExtendedACLResponse, error) { 249 return nil, status.Errorf(codes.Unimplemented, "method SetExtendedACL not implemented") 250 } 251 func (UnimplementedContainerServiceServer) GetExtendedACL(context.Context, *GetExtendedACLRequest) (*GetExtendedACLResponse, error) { 252 return nil, status.Errorf(codes.Unimplemented, "method GetExtendedACL not implemented") 253 } 254 func (UnimplementedContainerServiceServer) AnnounceUsedSpace(context.Context, *AnnounceUsedSpaceRequest) (*AnnounceUsedSpaceResponse, error) { 255 return nil, status.Errorf(codes.Unimplemented, "method AnnounceUsedSpace not implemented") 256 } 257 258 // UnsafeContainerServiceServer may be embedded to opt out of forward compatibility for this service. 259 // Use of this interface is not recommended, as added methods to ContainerServiceServer will 260 // result in compilation errors. 261 type UnsafeContainerServiceServer interface { 262 mustEmbedUnimplementedContainerServiceServer() 263 } 264 265 func RegisterContainerServiceServer(s grpc.ServiceRegistrar, srv ContainerServiceServer) { 266 s.RegisterService(&ContainerService_ServiceDesc, srv) 267 } 268 269 func _ContainerService_Put_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 270 in := new(PutRequest) 271 if err := dec(in); err != nil { 272 return nil, err 273 } 274 if interceptor == nil { 275 return srv.(ContainerServiceServer).Put(ctx, in) 276 } 277 info := &grpc.UnaryServerInfo{ 278 Server: srv, 279 FullMethod: "/neo.fs.v2.container.ContainerService/Put", 280 } 281 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 282 return srv.(ContainerServiceServer).Put(ctx, req.(*PutRequest)) 283 } 284 return interceptor(ctx, in, info, handler) 285 } 286 287 func _ContainerService_Delete_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 288 in := new(DeleteRequest) 289 if err := dec(in); err != nil { 290 return nil, err 291 } 292 if interceptor == nil { 293 return srv.(ContainerServiceServer).Delete(ctx, in) 294 } 295 info := &grpc.UnaryServerInfo{ 296 Server: srv, 297 FullMethod: "/neo.fs.v2.container.ContainerService/Delete", 298 } 299 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 300 return srv.(ContainerServiceServer).Delete(ctx, req.(*DeleteRequest)) 301 } 302 return interceptor(ctx, in, info, handler) 303 } 304 305 func _ContainerService_Get_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 306 in := new(GetRequest) 307 if err := dec(in); err != nil { 308 return nil, err 309 } 310 if interceptor == nil { 311 return srv.(ContainerServiceServer).Get(ctx, in) 312 } 313 info := &grpc.UnaryServerInfo{ 314 Server: srv, 315 FullMethod: "/neo.fs.v2.container.ContainerService/Get", 316 } 317 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 318 return srv.(ContainerServiceServer).Get(ctx, req.(*GetRequest)) 319 } 320 return interceptor(ctx, in, info, handler) 321 } 322 323 func _ContainerService_List_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 324 in := new(ListRequest) 325 if err := dec(in); err != nil { 326 return nil, err 327 } 328 if interceptor == nil { 329 return srv.(ContainerServiceServer).List(ctx, in) 330 } 331 info := &grpc.UnaryServerInfo{ 332 Server: srv, 333 FullMethod: "/neo.fs.v2.container.ContainerService/List", 334 } 335 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 336 return srv.(ContainerServiceServer).List(ctx, req.(*ListRequest)) 337 } 338 return interceptor(ctx, in, info, handler) 339 } 340 341 func _ContainerService_SetExtendedACL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 342 in := new(SetExtendedACLRequest) 343 if err := dec(in); err != nil { 344 return nil, err 345 } 346 if interceptor == nil { 347 return srv.(ContainerServiceServer).SetExtendedACL(ctx, in) 348 } 349 info := &grpc.UnaryServerInfo{ 350 Server: srv, 351 FullMethod: "/neo.fs.v2.container.ContainerService/SetExtendedACL", 352 } 353 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 354 return srv.(ContainerServiceServer).SetExtendedACL(ctx, req.(*SetExtendedACLRequest)) 355 } 356 return interceptor(ctx, in, info, handler) 357 } 358 359 func _ContainerService_GetExtendedACL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 360 in := new(GetExtendedACLRequest) 361 if err := dec(in); err != nil { 362 return nil, err 363 } 364 if interceptor == nil { 365 return srv.(ContainerServiceServer).GetExtendedACL(ctx, in) 366 } 367 info := &grpc.UnaryServerInfo{ 368 Server: srv, 369 FullMethod: "/neo.fs.v2.container.ContainerService/GetExtendedACL", 370 } 371 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 372 return srv.(ContainerServiceServer).GetExtendedACL(ctx, req.(*GetExtendedACLRequest)) 373 } 374 return interceptor(ctx, in, info, handler) 375 } 376 377 func _ContainerService_AnnounceUsedSpace_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 378 in := new(AnnounceUsedSpaceRequest) 379 if err := dec(in); err != nil { 380 return nil, err 381 } 382 if interceptor == nil { 383 return srv.(ContainerServiceServer).AnnounceUsedSpace(ctx, in) 384 } 385 info := &grpc.UnaryServerInfo{ 386 Server: srv, 387 FullMethod: "/neo.fs.v2.container.ContainerService/AnnounceUsedSpace", 388 } 389 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 390 return srv.(ContainerServiceServer).AnnounceUsedSpace(ctx, req.(*AnnounceUsedSpaceRequest)) 391 } 392 return interceptor(ctx, in, info, handler) 393 } 394 395 // ContainerService_ServiceDesc is the grpc.ServiceDesc for ContainerService service. 396 // It's only intended for direct use with grpc.RegisterService, 397 // and not to be introspected or modified (even as a copy) 398 var ContainerService_ServiceDesc = grpc.ServiceDesc{ 399 ServiceName: "neo.fs.v2.container.ContainerService", 400 HandlerType: (*ContainerServiceServer)(nil), 401 Methods: []grpc.MethodDesc{ 402 { 403 MethodName: "Put", 404 Handler: _ContainerService_Put_Handler, 405 }, 406 { 407 MethodName: "Delete", 408 Handler: _ContainerService_Delete_Handler, 409 }, 410 { 411 MethodName: "Get", 412 Handler: _ContainerService_Get_Handler, 413 }, 414 { 415 MethodName: "List", 416 Handler: _ContainerService_List_Handler, 417 }, 418 { 419 MethodName: "SetExtendedACL", 420 Handler: _ContainerService_SetExtendedACL_Handler, 421 }, 422 { 423 MethodName: "GetExtendedACL", 424 Handler: _ContainerService_GetExtendedACL_Handler, 425 }, 426 { 427 MethodName: "AnnounceUsedSpace", 428 Handler: _ContainerService_AnnounceUsedSpace_Handler, 429 }, 430 }, 431 Streams: []grpc.StreamDesc{}, 432 Metadata: "container/grpc/service.proto", 433 }