github.com/TrueCloudLab/frostfs-api-go/v2@v2.0.0-20230228134343-196241c4e79a/container/grpc/service_grpc.pb.go (about)

     1  // Code generated by protoc-gen-go-grpc. DO NOT EDIT.
     2  // versions:
     3  // - protoc-gen-go-grpc v1.2.0
     4  // - protoc             v3.21.9
     5  // source: container/grpc/service.proto
     6  
     7  package container
     8  
     9  import (
    10  	context "context"
    11  	grpc "google.golang.org/grpc"
    12  	codes "google.golang.org/grpc/codes"
    13  	status "google.golang.org/grpc/status"
    14  )
    15  
    16  // This is a compile-time assertion to ensure that this generated file
    17  // is compatible with the grpc package it is being compiled against.
    18  // Requires gRPC-Go v1.32.0 or later.
    19  const _ = grpc.SupportPackageIsVersion7
    20  
    21  // ContainerServiceClient is the client API for ContainerService service.
    22  //
    23  // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
    24  type ContainerServiceClient interface {
    25  	// `Put` invokes `Container` smart contract's `Put` method and returns
    26  	// response immediately. After a new block is issued in sidechain, request is
    27  	// verified by Inner Ring nodes. After one more block in sidechain, the container
    28  	// is added into smart contract storage.
    29  	//
    30  	// Statuses:
    31  	// - **OK** (0, SECTION_SUCCESS): \
    32  	//   request to save the container has been sent to the sidechain;
    33  	// - Common failures (SECTION_FAILURE_COMMON).
    34  	Put(ctx context.Context, in *PutRequest, opts ...grpc.CallOption) (*PutResponse, error)
    35  	// `Delete` invokes `Container` smart contract's `Delete` method and returns
    36  	// response immediately. After a new block is issued in sidechain, request is
    37  	// verified by Inner Ring nodes. After one more block in sidechain, the container
    38  	// is added into smart contract storage.
    39  	//
    40  	// Statuses:
    41  	// - **OK** (0, SECTION_SUCCESS): \
    42  	//   request to remove the container has been sent to the sidechain;
    43  	// - Common failures (SECTION_FAILURE_COMMON).
    44  	Delete(ctx context.Context, in *DeleteRequest, opts ...grpc.CallOption) (*DeleteResponse, error)
    45  	// Returns container structure from `Container` smart contract storage.
    46  	//
    47  	// Statuses:
    48  	// - **OK** (0, SECTION_SUCCESS): \
    49  	//   container has been successfully read;
    50  	// - Common failures (SECTION_FAILURE_COMMON);
    51  	// - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \
    52  	//   requested container not found.
    53  	Get(ctx context.Context, in *GetRequest, opts ...grpc.CallOption) (*GetResponse, error)
    54  	// Returns all owner's containers from 'Container` smart contract' storage.
    55  	//
    56  	// Statuses:
    57  	// - **OK** (0, SECTION_SUCCESS): \
    58  	//   container list has been successfully read;
    59  	// - Common failures (SECTION_FAILURE_COMMON).
    60  	List(ctx context.Context, in *ListRequest, opts ...grpc.CallOption) (*ListResponse, error)
    61  	// Invokes 'SetEACL' method of 'Container` smart contract and returns response
    62  	// immediately. After one more block in sidechain, changes in an Extended ACL are
    63  	// added into smart contract storage.
    64  	//
    65  	// Statuses:
    66  	// - **OK** (0, SECTION_SUCCESS): \
    67  	//   request to save container eACL has been sent to the sidechain;
    68  	// - Common failures (SECTION_FAILURE_COMMON).
    69  	SetExtendedACL(ctx context.Context, in *SetExtendedACLRequest, opts ...grpc.CallOption) (*SetExtendedACLResponse, error)
    70  	// Returns Extended ACL table and signature from `Container` smart contract
    71  	// storage.
    72  	//
    73  	// Statuses:
    74  	// - **OK** (0, SECTION_SUCCESS): \
    75  	//   container eACL has been successfully read;
    76  	// - Common failures (SECTION_FAILURE_COMMON);
    77  	// - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \
    78  	//   container not found;
    79  	// - **EACL_NOT_FOUND** (3073, SECTION_CONTAINER): \
    80  	//   eACL table not found.
    81  	GetExtendedACL(ctx context.Context, in *GetExtendedACLRequest, opts ...grpc.CallOption) (*GetExtendedACLResponse, error)
    82  	// Announces the space values used by the container for P2P synchronization.
    83  	//
    84  	// Statuses:
    85  	// - **OK** (0, SECTION_SUCCESS): \
    86  	//   estimation of used space has been successfully announced;
    87  	// - Common failures (SECTION_FAILURE_COMMON).
    88  	AnnounceUsedSpace(ctx context.Context, in *AnnounceUsedSpaceRequest, opts ...grpc.CallOption) (*AnnounceUsedSpaceResponse, error)
    89  }
    90  
    91  type containerServiceClient struct {
    92  	cc grpc.ClientConnInterface
    93  }
    94  
    95  func NewContainerServiceClient(cc grpc.ClientConnInterface) ContainerServiceClient {
    96  	return &containerServiceClient{cc}
    97  }
    98  
    99  func (c *containerServiceClient) Put(ctx context.Context, in *PutRequest, opts ...grpc.CallOption) (*PutResponse, error) {
   100  	out := new(PutResponse)
   101  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Put", in, out, opts...)
   102  	if err != nil {
   103  		return nil, err
   104  	}
   105  	return out, nil
   106  }
   107  
   108  func (c *containerServiceClient) Delete(ctx context.Context, in *DeleteRequest, opts ...grpc.CallOption) (*DeleteResponse, error) {
   109  	out := new(DeleteResponse)
   110  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Delete", in, out, opts...)
   111  	if err != nil {
   112  		return nil, err
   113  	}
   114  	return out, nil
   115  }
   116  
   117  func (c *containerServiceClient) Get(ctx context.Context, in *GetRequest, opts ...grpc.CallOption) (*GetResponse, error) {
   118  	out := new(GetResponse)
   119  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/Get", in, out, opts...)
   120  	if err != nil {
   121  		return nil, err
   122  	}
   123  	return out, nil
   124  }
   125  
   126  func (c *containerServiceClient) List(ctx context.Context, in *ListRequest, opts ...grpc.CallOption) (*ListResponse, error) {
   127  	out := new(ListResponse)
   128  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/List", in, out, opts...)
   129  	if err != nil {
   130  		return nil, err
   131  	}
   132  	return out, nil
   133  }
   134  
   135  func (c *containerServiceClient) SetExtendedACL(ctx context.Context, in *SetExtendedACLRequest, opts ...grpc.CallOption) (*SetExtendedACLResponse, error) {
   136  	out := new(SetExtendedACLResponse)
   137  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/SetExtendedACL", in, out, opts...)
   138  	if err != nil {
   139  		return nil, err
   140  	}
   141  	return out, nil
   142  }
   143  
   144  func (c *containerServiceClient) GetExtendedACL(ctx context.Context, in *GetExtendedACLRequest, opts ...grpc.CallOption) (*GetExtendedACLResponse, error) {
   145  	out := new(GetExtendedACLResponse)
   146  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/GetExtendedACL", in, out, opts...)
   147  	if err != nil {
   148  		return nil, err
   149  	}
   150  	return out, nil
   151  }
   152  
   153  func (c *containerServiceClient) AnnounceUsedSpace(ctx context.Context, in *AnnounceUsedSpaceRequest, opts ...grpc.CallOption) (*AnnounceUsedSpaceResponse, error) {
   154  	out := new(AnnounceUsedSpaceResponse)
   155  	err := c.cc.Invoke(ctx, "/neo.fs.v2.container.ContainerService/AnnounceUsedSpace", in, out, opts...)
   156  	if err != nil {
   157  		return nil, err
   158  	}
   159  	return out, nil
   160  }
   161  
   162  // ContainerServiceServer is the server API for ContainerService service.
   163  // All implementations should embed UnimplementedContainerServiceServer
   164  // for forward compatibility
   165  type ContainerServiceServer interface {
   166  	// `Put` invokes `Container` smart contract's `Put` method and returns
   167  	// response immediately. After a new block is issued in sidechain, request is
   168  	// verified by Inner Ring nodes. After one more block in sidechain, the container
   169  	// is added into smart contract storage.
   170  	//
   171  	// Statuses:
   172  	// - **OK** (0, SECTION_SUCCESS): \
   173  	//   request to save the container has been sent to the sidechain;
   174  	// - Common failures (SECTION_FAILURE_COMMON).
   175  	Put(context.Context, *PutRequest) (*PutResponse, error)
   176  	// `Delete` invokes `Container` smart contract's `Delete` method and returns
   177  	// response immediately. After a new block is issued in sidechain, request is
   178  	// verified by Inner Ring nodes. After one more block in sidechain, the container
   179  	// is added into smart contract storage.
   180  	//
   181  	// Statuses:
   182  	// - **OK** (0, SECTION_SUCCESS): \
   183  	//   request to remove the container has been sent to the sidechain;
   184  	// - Common failures (SECTION_FAILURE_COMMON).
   185  	Delete(context.Context, *DeleteRequest) (*DeleteResponse, error)
   186  	// Returns container structure from `Container` smart contract storage.
   187  	//
   188  	// Statuses:
   189  	// - **OK** (0, SECTION_SUCCESS): \
   190  	//   container has been successfully read;
   191  	// - Common failures (SECTION_FAILURE_COMMON);
   192  	// - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \
   193  	//   requested container not found.
   194  	Get(context.Context, *GetRequest) (*GetResponse, error)
   195  	// Returns all owner's containers from 'Container` smart contract' storage.
   196  	//
   197  	// Statuses:
   198  	// - **OK** (0, SECTION_SUCCESS): \
   199  	//   container list has been successfully read;
   200  	// - Common failures (SECTION_FAILURE_COMMON).
   201  	List(context.Context, *ListRequest) (*ListResponse, error)
   202  	// Invokes 'SetEACL' method of 'Container` smart contract and returns response
   203  	// immediately. After one more block in sidechain, changes in an Extended ACL are
   204  	// added into smart contract storage.
   205  	//
   206  	// Statuses:
   207  	// - **OK** (0, SECTION_SUCCESS): \
   208  	//   request to save container eACL has been sent to the sidechain;
   209  	// - Common failures (SECTION_FAILURE_COMMON).
   210  	SetExtendedACL(context.Context, *SetExtendedACLRequest) (*SetExtendedACLResponse, error)
   211  	// Returns Extended ACL table and signature from `Container` smart contract
   212  	// storage.
   213  	//
   214  	// Statuses:
   215  	// - **OK** (0, SECTION_SUCCESS): \
   216  	//   container eACL has been successfully read;
   217  	// - Common failures (SECTION_FAILURE_COMMON);
   218  	// - **CONTAINER_NOT_FOUND** (3072, SECTION_CONTAINER): \
   219  	//   container not found;
   220  	// - **EACL_NOT_FOUND** (3073, SECTION_CONTAINER): \
   221  	//   eACL table not found.
   222  	GetExtendedACL(context.Context, *GetExtendedACLRequest) (*GetExtendedACLResponse, error)
   223  	// Announces the space values used by the container for P2P synchronization.
   224  	//
   225  	// Statuses:
   226  	// - **OK** (0, SECTION_SUCCESS): \
   227  	//   estimation of used space has been successfully announced;
   228  	// - Common failures (SECTION_FAILURE_COMMON).
   229  	AnnounceUsedSpace(context.Context, *AnnounceUsedSpaceRequest) (*AnnounceUsedSpaceResponse, error)
   230  }
   231  
   232  // UnimplementedContainerServiceServer should be embedded to have forward compatible implementations.
   233  type UnimplementedContainerServiceServer struct {
   234  }
   235  
   236  func (UnimplementedContainerServiceServer) Put(context.Context, *PutRequest) (*PutResponse, error) {
   237  	return nil, status.Errorf(codes.Unimplemented, "method Put not implemented")
   238  }
   239  func (UnimplementedContainerServiceServer) Delete(context.Context, *DeleteRequest) (*DeleteResponse, error) {
   240  	return nil, status.Errorf(codes.Unimplemented, "method Delete not implemented")
   241  }
   242  func (UnimplementedContainerServiceServer) Get(context.Context, *GetRequest) (*GetResponse, error) {
   243  	return nil, status.Errorf(codes.Unimplemented, "method Get not implemented")
   244  }
   245  func (UnimplementedContainerServiceServer) List(context.Context, *ListRequest) (*ListResponse, error) {
   246  	return nil, status.Errorf(codes.Unimplemented, "method List not implemented")
   247  }
   248  func (UnimplementedContainerServiceServer) SetExtendedACL(context.Context, *SetExtendedACLRequest) (*SetExtendedACLResponse, error) {
   249  	return nil, status.Errorf(codes.Unimplemented, "method SetExtendedACL not implemented")
   250  }
   251  func (UnimplementedContainerServiceServer) GetExtendedACL(context.Context, *GetExtendedACLRequest) (*GetExtendedACLResponse, error) {
   252  	return nil, status.Errorf(codes.Unimplemented, "method GetExtendedACL not implemented")
   253  }
   254  func (UnimplementedContainerServiceServer) AnnounceUsedSpace(context.Context, *AnnounceUsedSpaceRequest) (*AnnounceUsedSpaceResponse, error) {
   255  	return nil, status.Errorf(codes.Unimplemented, "method AnnounceUsedSpace not implemented")
   256  }
   257  
   258  // UnsafeContainerServiceServer may be embedded to opt out of forward compatibility for this service.
   259  // Use of this interface is not recommended, as added methods to ContainerServiceServer will
   260  // result in compilation errors.
   261  type UnsafeContainerServiceServer interface {
   262  	mustEmbedUnimplementedContainerServiceServer()
   263  }
   264  
   265  func RegisterContainerServiceServer(s grpc.ServiceRegistrar, srv ContainerServiceServer) {
   266  	s.RegisterService(&ContainerService_ServiceDesc, srv)
   267  }
   268  
   269  func _ContainerService_Put_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   270  	in := new(PutRequest)
   271  	if err := dec(in); err != nil {
   272  		return nil, err
   273  	}
   274  	if interceptor == nil {
   275  		return srv.(ContainerServiceServer).Put(ctx, in)
   276  	}
   277  	info := &grpc.UnaryServerInfo{
   278  		Server:     srv,
   279  		FullMethod: "/neo.fs.v2.container.ContainerService/Put",
   280  	}
   281  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   282  		return srv.(ContainerServiceServer).Put(ctx, req.(*PutRequest))
   283  	}
   284  	return interceptor(ctx, in, info, handler)
   285  }
   286  
   287  func _ContainerService_Delete_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   288  	in := new(DeleteRequest)
   289  	if err := dec(in); err != nil {
   290  		return nil, err
   291  	}
   292  	if interceptor == nil {
   293  		return srv.(ContainerServiceServer).Delete(ctx, in)
   294  	}
   295  	info := &grpc.UnaryServerInfo{
   296  		Server:     srv,
   297  		FullMethod: "/neo.fs.v2.container.ContainerService/Delete",
   298  	}
   299  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   300  		return srv.(ContainerServiceServer).Delete(ctx, req.(*DeleteRequest))
   301  	}
   302  	return interceptor(ctx, in, info, handler)
   303  }
   304  
   305  func _ContainerService_Get_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   306  	in := new(GetRequest)
   307  	if err := dec(in); err != nil {
   308  		return nil, err
   309  	}
   310  	if interceptor == nil {
   311  		return srv.(ContainerServiceServer).Get(ctx, in)
   312  	}
   313  	info := &grpc.UnaryServerInfo{
   314  		Server:     srv,
   315  		FullMethod: "/neo.fs.v2.container.ContainerService/Get",
   316  	}
   317  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   318  		return srv.(ContainerServiceServer).Get(ctx, req.(*GetRequest))
   319  	}
   320  	return interceptor(ctx, in, info, handler)
   321  }
   322  
   323  func _ContainerService_List_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   324  	in := new(ListRequest)
   325  	if err := dec(in); err != nil {
   326  		return nil, err
   327  	}
   328  	if interceptor == nil {
   329  		return srv.(ContainerServiceServer).List(ctx, in)
   330  	}
   331  	info := &grpc.UnaryServerInfo{
   332  		Server:     srv,
   333  		FullMethod: "/neo.fs.v2.container.ContainerService/List",
   334  	}
   335  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   336  		return srv.(ContainerServiceServer).List(ctx, req.(*ListRequest))
   337  	}
   338  	return interceptor(ctx, in, info, handler)
   339  }
   340  
   341  func _ContainerService_SetExtendedACL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   342  	in := new(SetExtendedACLRequest)
   343  	if err := dec(in); err != nil {
   344  		return nil, err
   345  	}
   346  	if interceptor == nil {
   347  		return srv.(ContainerServiceServer).SetExtendedACL(ctx, in)
   348  	}
   349  	info := &grpc.UnaryServerInfo{
   350  		Server:     srv,
   351  		FullMethod: "/neo.fs.v2.container.ContainerService/SetExtendedACL",
   352  	}
   353  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   354  		return srv.(ContainerServiceServer).SetExtendedACL(ctx, req.(*SetExtendedACLRequest))
   355  	}
   356  	return interceptor(ctx, in, info, handler)
   357  }
   358  
   359  func _ContainerService_GetExtendedACL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   360  	in := new(GetExtendedACLRequest)
   361  	if err := dec(in); err != nil {
   362  		return nil, err
   363  	}
   364  	if interceptor == nil {
   365  		return srv.(ContainerServiceServer).GetExtendedACL(ctx, in)
   366  	}
   367  	info := &grpc.UnaryServerInfo{
   368  		Server:     srv,
   369  		FullMethod: "/neo.fs.v2.container.ContainerService/GetExtendedACL",
   370  	}
   371  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   372  		return srv.(ContainerServiceServer).GetExtendedACL(ctx, req.(*GetExtendedACLRequest))
   373  	}
   374  	return interceptor(ctx, in, info, handler)
   375  }
   376  
   377  func _ContainerService_AnnounceUsedSpace_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   378  	in := new(AnnounceUsedSpaceRequest)
   379  	if err := dec(in); err != nil {
   380  		return nil, err
   381  	}
   382  	if interceptor == nil {
   383  		return srv.(ContainerServiceServer).AnnounceUsedSpace(ctx, in)
   384  	}
   385  	info := &grpc.UnaryServerInfo{
   386  		Server:     srv,
   387  		FullMethod: "/neo.fs.v2.container.ContainerService/AnnounceUsedSpace",
   388  	}
   389  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   390  		return srv.(ContainerServiceServer).AnnounceUsedSpace(ctx, req.(*AnnounceUsedSpaceRequest))
   391  	}
   392  	return interceptor(ctx, in, info, handler)
   393  }
   394  
   395  // ContainerService_ServiceDesc is the grpc.ServiceDesc for ContainerService service.
   396  // It's only intended for direct use with grpc.RegisterService,
   397  // and not to be introspected or modified (even as a copy)
   398  var ContainerService_ServiceDesc = grpc.ServiceDesc{
   399  	ServiceName: "neo.fs.v2.container.ContainerService",
   400  	HandlerType: (*ContainerServiceServer)(nil),
   401  	Methods: []grpc.MethodDesc{
   402  		{
   403  			MethodName: "Put",
   404  			Handler:    _ContainerService_Put_Handler,
   405  		},
   406  		{
   407  			MethodName: "Delete",
   408  			Handler:    _ContainerService_Delete_Handler,
   409  		},
   410  		{
   411  			MethodName: "Get",
   412  			Handler:    _ContainerService_Get_Handler,
   413  		},
   414  		{
   415  			MethodName: "List",
   416  			Handler:    _ContainerService_List_Handler,
   417  		},
   418  		{
   419  			MethodName: "SetExtendedACL",
   420  			Handler:    _ContainerService_SetExtendedACL_Handler,
   421  		},
   422  		{
   423  			MethodName: "GetExtendedACL",
   424  			Handler:    _ContainerService_GetExtendedACL_Handler,
   425  		},
   426  		{
   427  			MethodName: "AnnounceUsedSpace",
   428  			Handler:    _ContainerService_AnnounceUsedSpace_Handler,
   429  		},
   430  	},
   431  	Streams:  []grpc.StreamDesc{},
   432  	Metadata: "container/grpc/service.proto",
   433  }