github.com/infraboard/keyauth@v0.8.1/apps/permission/service_grpc.pb.go (about)

     1  // Code generated by protoc-gen-go-grpc. DO NOT EDIT.
     2  // versions:
     3  // - protoc-gen-go-grpc v1.2.0
     4  // - protoc             v3.19.1
     5  // source: apps/permission/pb/service.proto
     6  
     7  package permission
     8  
     9  import (
    10  	context "context"
    11  	role "github.com/infraboard/keyauth/apps/role"
    12  	grpc "google.golang.org/grpc"
    13  	codes "google.golang.org/grpc/codes"
    14  	status "google.golang.org/grpc/status"
    15  )
    16  
    17  // This is a compile-time assertion to ensure that this generated file
    18  // is compatible with the grpc package it is being compiled against.
    19  // Requires gRPC-Go v1.32.0 or later.
    20  const _ = grpc.SupportPackageIsVersion7
    21  
    22  // ServiceClient is the client API for Service service.
    23  //
    24  // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
    25  type ServiceClient interface {
    26  	QueryPermission(ctx context.Context, in *QueryPermissionRequest, opts ...grpc.CallOption) (*role.PermissionSet, error)
    27  	QueryRole(ctx context.Context, in *QueryRoleRequest, opts ...grpc.CallOption) (*role.Set, error)
    28  	CheckPermission(ctx context.Context, in *CheckPermissionRequest, opts ...grpc.CallOption) (*role.Permission, error)
    29  }
    30  
    31  type serviceClient struct {
    32  	cc grpc.ClientConnInterface
    33  }
    34  
    35  func NewServiceClient(cc grpc.ClientConnInterface) ServiceClient {
    36  	return &serviceClient{cc}
    37  }
    38  
    39  func (c *serviceClient) QueryPermission(ctx context.Context, in *QueryPermissionRequest, opts ...grpc.CallOption) (*role.PermissionSet, error) {
    40  	out := new(role.PermissionSet)
    41  	err := c.cc.Invoke(ctx, "/infraboard.keyauth.permission.Service/QueryPermission", in, out, opts...)
    42  	if err != nil {
    43  		return nil, err
    44  	}
    45  	return out, nil
    46  }
    47  
    48  func (c *serviceClient) QueryRole(ctx context.Context, in *QueryRoleRequest, opts ...grpc.CallOption) (*role.Set, error) {
    49  	out := new(role.Set)
    50  	err := c.cc.Invoke(ctx, "/infraboard.keyauth.permission.Service/QueryRole", in, out, opts...)
    51  	if err != nil {
    52  		return nil, err
    53  	}
    54  	return out, nil
    55  }
    56  
    57  func (c *serviceClient) CheckPermission(ctx context.Context, in *CheckPermissionRequest, opts ...grpc.CallOption) (*role.Permission, error) {
    58  	out := new(role.Permission)
    59  	err := c.cc.Invoke(ctx, "/infraboard.keyauth.permission.Service/CheckPermission", in, out, opts...)
    60  	if err != nil {
    61  		return nil, err
    62  	}
    63  	return out, nil
    64  }
    65  
    66  // ServiceServer is the server API for Service service.
    67  // All implementations must embed UnimplementedServiceServer
    68  // for forward compatibility
    69  type ServiceServer interface {
    70  	QueryPermission(context.Context, *QueryPermissionRequest) (*role.PermissionSet, error)
    71  	QueryRole(context.Context, *QueryRoleRequest) (*role.Set, error)
    72  	CheckPermission(context.Context, *CheckPermissionRequest) (*role.Permission, error)
    73  	mustEmbedUnimplementedServiceServer()
    74  }
    75  
    76  // UnimplementedServiceServer must be embedded to have forward compatible implementations.
    77  type UnimplementedServiceServer struct {
    78  }
    79  
    80  func (UnimplementedServiceServer) QueryPermission(context.Context, *QueryPermissionRequest) (*role.PermissionSet, error) {
    81  	return nil, status.Errorf(codes.Unimplemented, "method QueryPermission not implemented")
    82  }
    83  func (UnimplementedServiceServer) QueryRole(context.Context, *QueryRoleRequest) (*role.Set, error) {
    84  	return nil, status.Errorf(codes.Unimplemented, "method QueryRole not implemented")
    85  }
    86  func (UnimplementedServiceServer) CheckPermission(context.Context, *CheckPermissionRequest) (*role.Permission, error) {
    87  	return nil, status.Errorf(codes.Unimplemented, "method CheckPermission not implemented")
    88  }
    89  func (UnimplementedServiceServer) mustEmbedUnimplementedServiceServer() {}
    90  
    91  // UnsafeServiceServer may be embedded to opt out of forward compatibility for this service.
    92  // Use of this interface is not recommended, as added methods to ServiceServer will
    93  // result in compilation errors.
    94  type UnsafeServiceServer interface {
    95  	mustEmbedUnimplementedServiceServer()
    96  }
    97  
    98  func RegisterServiceServer(s grpc.ServiceRegistrar, srv ServiceServer) {
    99  	s.RegisterService(&Service_ServiceDesc, srv)
   100  }
   101  
   102  func _Service_QueryPermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   103  	in := new(QueryPermissionRequest)
   104  	if err := dec(in); err != nil {
   105  		return nil, err
   106  	}
   107  	if interceptor == nil {
   108  		return srv.(ServiceServer).QueryPermission(ctx, in)
   109  	}
   110  	info := &grpc.UnaryServerInfo{
   111  		Server:     srv,
   112  		FullMethod: "/infraboard.keyauth.permission.Service/QueryPermission",
   113  	}
   114  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   115  		return srv.(ServiceServer).QueryPermission(ctx, req.(*QueryPermissionRequest))
   116  	}
   117  	return interceptor(ctx, in, info, handler)
   118  }
   119  
   120  func _Service_QueryRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   121  	in := new(QueryRoleRequest)
   122  	if err := dec(in); err != nil {
   123  		return nil, err
   124  	}
   125  	if interceptor == nil {
   126  		return srv.(ServiceServer).QueryRole(ctx, in)
   127  	}
   128  	info := &grpc.UnaryServerInfo{
   129  		Server:     srv,
   130  		FullMethod: "/infraboard.keyauth.permission.Service/QueryRole",
   131  	}
   132  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   133  		return srv.(ServiceServer).QueryRole(ctx, req.(*QueryRoleRequest))
   134  	}
   135  	return interceptor(ctx, in, info, handler)
   136  }
   137  
   138  func _Service_CheckPermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
   139  	in := new(CheckPermissionRequest)
   140  	if err := dec(in); err != nil {
   141  		return nil, err
   142  	}
   143  	if interceptor == nil {
   144  		return srv.(ServiceServer).CheckPermission(ctx, in)
   145  	}
   146  	info := &grpc.UnaryServerInfo{
   147  		Server:     srv,
   148  		FullMethod: "/infraboard.keyauth.permission.Service/CheckPermission",
   149  	}
   150  	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
   151  		return srv.(ServiceServer).CheckPermission(ctx, req.(*CheckPermissionRequest))
   152  	}
   153  	return interceptor(ctx, in, info, handler)
   154  }
   155  
   156  // Service_ServiceDesc is the grpc.ServiceDesc for Service service.
   157  // It's only intended for direct use with grpc.RegisterService,
   158  // and not to be introspected or modified (even as a copy)
   159  var Service_ServiceDesc = grpc.ServiceDesc{
   160  	ServiceName: "infraboard.keyauth.permission.Service",
   161  	HandlerType: (*ServiceServer)(nil),
   162  	Methods: []grpc.MethodDesc{
   163  		{
   164  			MethodName: "QueryPermission",
   165  			Handler:    _Service_QueryPermission_Handler,
   166  		},
   167  		{
   168  			MethodName: "QueryRole",
   169  			Handler:    _Service_QueryRole_Handler,
   170  		},
   171  		{
   172  			MethodName: "CheckPermission",
   173  			Handler:    _Service_CheckPermission_Handler,
   174  		},
   175  	},
   176  	Streams:  []grpc.StreamDesc{},
   177  	Metadata: "apps/permission/pb/service.proto",
   178  }