mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			1136 lines
		
	
	
		
			44 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1136 lines
		
	
	
		
			44 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Code generated by protoc-gen-go-grpc. DO NOT EDIT.
 | |
| 
 | |
| package pb
 | |
| 
 | |
| import (
 | |
| 	context "context"
 | |
| 	grpc "google.golang.org/grpc"
 | |
| 	codes "google.golang.org/grpc/codes"
 | |
| 	status "google.golang.org/grpc/status"
 | |
| )
 | |
| 
 | |
| // This is a compile-time assertion to ensure that this generated file
 | |
| // is compatible with the grpc package it is being compiled against.
 | |
| // Requires gRPC-Go v1.32.0 or later.
 | |
| const _ = grpc.SupportPackageIsVersion7
 | |
| 
 | |
| // BackendClient is the client API for Backend service.
 | |
| //
 | |
| // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
 | |
| type BackendClient interface {
 | |
| 	// HandleRequest is used to handle a request and generate a response.
 | |
| 	// The plugins must check the operation type and handle appropriately.
 | |
| 	HandleRequest(ctx context.Context, in *HandleRequestArgs, opts ...grpc.CallOption) (*HandleRequestReply, error)
 | |
| 	// SpecialPaths is a list of paths that are special in some way.
 | |
| 	// See PathType for the types of special paths. The key is the type
 | |
| 	// of the special path, and the value is a list of paths for this type.
 | |
| 	// This is not a regular expression but is an exact match. If the path
 | |
| 	// ends in '*' then it is a prefix-based match. The '*' can only appear
 | |
| 	// at the end.
 | |
| 	SpecialPaths(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*SpecialPathsReply, error)
 | |
| 	// HandleExistenceCheck is used to handle a request and generate a response
 | |
| 	// indicating whether the given path exists or not; this is used to
 | |
| 	// understand whether the request must have a Create or Update capability
 | |
| 	// ACL applied. The first bool indicates whether an existence check
 | |
| 	// function was found for the backend; the second indicates whether, if an
 | |
| 	// existence check function was found, the item exists or not.
 | |
| 	HandleExistenceCheck(ctx context.Context, in *HandleExistenceCheckArgs, opts ...grpc.CallOption) (*HandleExistenceCheckReply, error)
 | |
| 	// Cleanup is invoked during an unmount of a backend to allow it to
 | |
| 	// handle any cleanup like connection closing or releasing of file handles.
 | |
| 	// Cleanup is called right before Vault closes the plugin process.
 | |
| 	Cleanup(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error)
 | |
| 	// InvalidateKey may be invoked when an object is modified that belongs
 | |
| 	// to the backend. The backend can use this to clear any caches or reset
 | |
| 	// internal state as needed.
 | |
| 	InvalidateKey(ctx context.Context, in *InvalidateKeyArgs, opts ...grpc.CallOption) (*Empty, error)
 | |
| 	// Setup is used to set up the backend based on the provided backend
 | |
| 	// configuration. The plugin's setup implementation should use the provided
 | |
| 	// broker_id to create a connection back to Vault for use with the Storage
 | |
| 	// and SystemView clients.
 | |
| 	Setup(ctx context.Context, in *SetupArgs, opts ...grpc.CallOption) (*SetupReply, error)
 | |
| 	// Initialize is invoked just after mounting a backend to allow it to
 | |
| 	// handle any initialization tasks that need to be performed.
 | |
| 	Initialize(ctx context.Context, in *InitializeArgs, opts ...grpc.CallOption) (*InitializeReply, error)
 | |
| 	// Type returns the BackendType for the particular backend
 | |
| 	Type(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TypeReply, error)
 | |
| }
 | |
| 
 | |
| type backendClient struct {
 | |
| 	cc grpc.ClientConnInterface
 | |
| }
 | |
| 
 | |
| func NewBackendClient(cc grpc.ClientConnInterface) BackendClient {
 | |
| 	return &backendClient{cc}
 | |
| }
 | |
| 
 | |
| func (c *backendClient) HandleRequest(ctx context.Context, in *HandleRequestArgs, opts ...grpc.CallOption) (*HandleRequestReply, error) {
 | |
| 	out := new(HandleRequestReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/HandleRequest", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) SpecialPaths(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*SpecialPathsReply, error) {
 | |
| 	out := new(SpecialPathsReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/SpecialPaths", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) HandleExistenceCheck(ctx context.Context, in *HandleExistenceCheckArgs, opts ...grpc.CallOption) (*HandleExistenceCheckReply, error) {
 | |
| 	out := new(HandleExistenceCheckReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/HandleExistenceCheck", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) Cleanup(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) {
 | |
| 	out := new(Empty)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/Cleanup", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) InvalidateKey(ctx context.Context, in *InvalidateKeyArgs, opts ...grpc.CallOption) (*Empty, error) {
 | |
| 	out := new(Empty)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/InvalidateKey", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) Setup(ctx context.Context, in *SetupArgs, opts ...grpc.CallOption) (*SetupReply, error) {
 | |
| 	out := new(SetupReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/Setup", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) Initialize(ctx context.Context, in *InitializeArgs, opts ...grpc.CallOption) (*InitializeReply, error) {
 | |
| 	out := new(InitializeReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/Initialize", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *backendClient) Type(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TypeReply, error) {
 | |
| 	out := new(TypeReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Backend/Type", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| // BackendServer is the server API for Backend service.
 | |
| // All implementations must embed UnimplementedBackendServer
 | |
| // for forward compatibility
 | |
| type BackendServer interface {
 | |
| 	// HandleRequest is used to handle a request and generate a response.
 | |
| 	// The plugins must check the operation type and handle appropriately.
 | |
| 	HandleRequest(context.Context, *HandleRequestArgs) (*HandleRequestReply, error)
 | |
| 	// SpecialPaths is a list of paths that are special in some way.
 | |
| 	// See PathType for the types of special paths. The key is the type
 | |
| 	// of the special path, and the value is a list of paths for this type.
 | |
| 	// This is not a regular expression but is an exact match. If the path
 | |
| 	// ends in '*' then it is a prefix-based match. The '*' can only appear
 | |
| 	// at the end.
 | |
| 	SpecialPaths(context.Context, *Empty) (*SpecialPathsReply, error)
 | |
| 	// HandleExistenceCheck is used to handle a request and generate a response
 | |
| 	// indicating whether the given path exists or not; this is used to
 | |
| 	// understand whether the request must have a Create or Update capability
 | |
| 	// ACL applied. The first bool indicates whether an existence check
 | |
| 	// function was found for the backend; the second indicates whether, if an
 | |
| 	// existence check function was found, the item exists or not.
 | |
| 	HandleExistenceCheck(context.Context, *HandleExistenceCheckArgs) (*HandleExistenceCheckReply, error)
 | |
| 	// Cleanup is invoked during an unmount of a backend to allow it to
 | |
| 	// handle any cleanup like connection closing or releasing of file handles.
 | |
| 	// Cleanup is called right before Vault closes the plugin process.
 | |
| 	Cleanup(context.Context, *Empty) (*Empty, error)
 | |
| 	// InvalidateKey may be invoked when an object is modified that belongs
 | |
| 	// to the backend. The backend can use this to clear any caches or reset
 | |
| 	// internal state as needed.
 | |
| 	InvalidateKey(context.Context, *InvalidateKeyArgs) (*Empty, error)
 | |
| 	// Setup is used to set up the backend based on the provided backend
 | |
| 	// configuration. The plugin's setup implementation should use the provided
 | |
| 	// broker_id to create a connection back to Vault for use with the Storage
 | |
| 	// and SystemView clients.
 | |
| 	Setup(context.Context, *SetupArgs) (*SetupReply, error)
 | |
| 	// Initialize is invoked just after mounting a backend to allow it to
 | |
| 	// handle any initialization tasks that need to be performed.
 | |
| 	Initialize(context.Context, *InitializeArgs) (*InitializeReply, error)
 | |
| 	// Type returns the BackendType for the particular backend
 | |
| 	Type(context.Context, *Empty) (*TypeReply, error)
 | |
| 	mustEmbedUnimplementedBackendServer()
 | |
| }
 | |
| 
 | |
| // UnimplementedBackendServer must be embedded to have forward compatible implementations.
 | |
| type UnimplementedBackendServer struct {
 | |
| }
 | |
| 
 | |
| func (UnimplementedBackendServer) HandleRequest(context.Context, *HandleRequestArgs) (*HandleRequestReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method HandleRequest not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) SpecialPaths(context.Context, *Empty) (*SpecialPathsReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method SpecialPaths not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) HandleExistenceCheck(context.Context, *HandleExistenceCheckArgs) (*HandleExistenceCheckReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method HandleExistenceCheck not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) Cleanup(context.Context, *Empty) (*Empty, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Cleanup not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) InvalidateKey(context.Context, *InvalidateKeyArgs) (*Empty, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method InvalidateKey not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) Setup(context.Context, *SetupArgs) (*SetupReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Setup not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) Initialize(context.Context, *InitializeArgs) (*InitializeReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Initialize not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) Type(context.Context, *Empty) (*TypeReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Type not implemented")
 | |
| }
 | |
| func (UnimplementedBackendServer) mustEmbedUnimplementedBackendServer() {}
 | |
| 
 | |
| // UnsafeBackendServer may be embedded to opt out of forward compatibility for this service.
 | |
| // Use of this interface is not recommended, as added methods to BackendServer will
 | |
| // result in compilation errors.
 | |
| type UnsafeBackendServer interface {
 | |
| 	mustEmbedUnimplementedBackendServer()
 | |
| }
 | |
| 
 | |
| func RegisterBackendServer(s grpc.ServiceRegistrar, srv BackendServer) {
 | |
| 	s.RegisterService(&Backend_ServiceDesc, srv)
 | |
| }
 | |
| 
 | |
| func _Backend_HandleRequest_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(HandleRequestArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).HandleRequest(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/HandleRequest",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).HandleRequest(ctx, req.(*HandleRequestArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_SpecialPaths_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).SpecialPaths(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/SpecialPaths",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).SpecialPaths(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_HandleExistenceCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(HandleExistenceCheckArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).HandleExistenceCheck(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/HandleExistenceCheck",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).HandleExistenceCheck(ctx, req.(*HandleExistenceCheckArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_Cleanup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).Cleanup(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/Cleanup",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).Cleanup(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_InvalidateKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(InvalidateKeyArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).InvalidateKey(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/InvalidateKey",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).InvalidateKey(ctx, req.(*InvalidateKeyArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_Setup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(SetupArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).Setup(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/Setup",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).Setup(ctx, req.(*SetupArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_Initialize_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(InitializeArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).Initialize(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/Initialize",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).Initialize(ctx, req.(*InitializeArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Backend_Type_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(BackendServer).Type(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Backend/Type",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(BackendServer).Type(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| // Backend_ServiceDesc is the grpc.ServiceDesc for Backend service.
 | |
| // It's only intended for direct use with grpc.RegisterService,
 | |
| // and not to be introspected or modified (even as a copy)
 | |
| var Backend_ServiceDesc = grpc.ServiceDesc{
 | |
| 	ServiceName: "pb.Backend",
 | |
| 	HandlerType: (*BackendServer)(nil),
 | |
| 	Methods: []grpc.MethodDesc{
 | |
| 		{
 | |
| 			MethodName: "HandleRequest",
 | |
| 			Handler:    _Backend_HandleRequest_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "SpecialPaths",
 | |
| 			Handler:    _Backend_SpecialPaths_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "HandleExistenceCheck",
 | |
| 			Handler:    _Backend_HandleExistenceCheck_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Cleanup",
 | |
| 			Handler:    _Backend_Cleanup_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "InvalidateKey",
 | |
| 			Handler:    _Backend_InvalidateKey_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Setup",
 | |
| 			Handler:    _Backend_Setup_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Initialize",
 | |
| 			Handler:    _Backend_Initialize_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Type",
 | |
| 			Handler:    _Backend_Type_Handler,
 | |
| 		},
 | |
| 	},
 | |
| 	Streams:  []grpc.StreamDesc{},
 | |
| 	Metadata: "sdk/plugin/pb/backend.proto",
 | |
| }
 | |
| 
 | |
| // StorageClient is the client API for Storage service.
 | |
| //
 | |
| // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
 | |
| type StorageClient interface {
 | |
| 	List(ctx context.Context, in *StorageListArgs, opts ...grpc.CallOption) (*StorageListReply, error)
 | |
| 	Get(ctx context.Context, in *StorageGetArgs, opts ...grpc.CallOption) (*StorageGetReply, error)
 | |
| 	Put(ctx context.Context, in *StoragePutArgs, opts ...grpc.CallOption) (*StoragePutReply, error)
 | |
| 	Delete(ctx context.Context, in *StorageDeleteArgs, opts ...grpc.CallOption) (*StorageDeleteReply, error)
 | |
| }
 | |
| 
 | |
| type storageClient struct {
 | |
| 	cc grpc.ClientConnInterface
 | |
| }
 | |
| 
 | |
| func NewStorageClient(cc grpc.ClientConnInterface) StorageClient {
 | |
| 	return &storageClient{cc}
 | |
| }
 | |
| 
 | |
| func (c *storageClient) List(ctx context.Context, in *StorageListArgs, opts ...grpc.CallOption) (*StorageListReply, error) {
 | |
| 	out := new(StorageListReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Storage/List", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *storageClient) Get(ctx context.Context, in *StorageGetArgs, opts ...grpc.CallOption) (*StorageGetReply, error) {
 | |
| 	out := new(StorageGetReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Storage/Get", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *storageClient) Put(ctx context.Context, in *StoragePutArgs, opts ...grpc.CallOption) (*StoragePutReply, error) {
 | |
| 	out := new(StoragePutReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Storage/Put", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *storageClient) Delete(ctx context.Context, in *StorageDeleteArgs, opts ...grpc.CallOption) (*StorageDeleteReply, error) {
 | |
| 	out := new(StorageDeleteReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.Storage/Delete", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| // StorageServer is the server API for Storage service.
 | |
| // All implementations must embed UnimplementedStorageServer
 | |
| // for forward compatibility
 | |
| type StorageServer interface {
 | |
| 	List(context.Context, *StorageListArgs) (*StorageListReply, error)
 | |
| 	Get(context.Context, *StorageGetArgs) (*StorageGetReply, error)
 | |
| 	Put(context.Context, *StoragePutArgs) (*StoragePutReply, error)
 | |
| 	Delete(context.Context, *StorageDeleteArgs) (*StorageDeleteReply, error)
 | |
| 	mustEmbedUnimplementedStorageServer()
 | |
| }
 | |
| 
 | |
| // UnimplementedStorageServer must be embedded to have forward compatible implementations.
 | |
| type UnimplementedStorageServer struct {
 | |
| }
 | |
| 
 | |
| func (UnimplementedStorageServer) List(context.Context, *StorageListArgs) (*StorageListReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method List not implemented")
 | |
| }
 | |
| func (UnimplementedStorageServer) Get(context.Context, *StorageGetArgs) (*StorageGetReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Get not implemented")
 | |
| }
 | |
| func (UnimplementedStorageServer) Put(context.Context, *StoragePutArgs) (*StoragePutReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Put not implemented")
 | |
| }
 | |
| func (UnimplementedStorageServer) Delete(context.Context, *StorageDeleteArgs) (*StorageDeleteReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Delete not implemented")
 | |
| }
 | |
| func (UnimplementedStorageServer) mustEmbedUnimplementedStorageServer() {}
 | |
| 
 | |
| // UnsafeStorageServer may be embedded to opt out of forward compatibility for this service.
 | |
| // Use of this interface is not recommended, as added methods to StorageServer will
 | |
| // result in compilation errors.
 | |
| type UnsafeStorageServer interface {
 | |
| 	mustEmbedUnimplementedStorageServer()
 | |
| }
 | |
| 
 | |
| func RegisterStorageServer(s grpc.ServiceRegistrar, srv StorageServer) {
 | |
| 	s.RegisterService(&Storage_ServiceDesc, srv)
 | |
| }
 | |
| 
 | |
| func _Storage_List_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(StorageListArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(StorageServer).List(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Storage/List",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(StorageServer).List(ctx, req.(*StorageListArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Storage_Get_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(StorageGetArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(StorageServer).Get(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Storage/Get",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(StorageServer).Get(ctx, req.(*StorageGetArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Storage_Put_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(StoragePutArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(StorageServer).Put(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Storage/Put",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(StorageServer).Put(ctx, req.(*StoragePutArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _Storage_Delete_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(StorageDeleteArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(StorageServer).Delete(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.Storage/Delete",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(StorageServer).Delete(ctx, req.(*StorageDeleteArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| // Storage_ServiceDesc is the grpc.ServiceDesc for Storage service.
 | |
| // It's only intended for direct use with grpc.RegisterService,
 | |
| // and not to be introspected or modified (even as a copy)
 | |
| var Storage_ServiceDesc = grpc.ServiceDesc{
 | |
| 	ServiceName: "pb.Storage",
 | |
| 	HandlerType: (*StorageServer)(nil),
 | |
| 	Methods: []grpc.MethodDesc{
 | |
| 		{
 | |
| 			MethodName: "List",
 | |
| 			Handler:    _Storage_List_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Get",
 | |
| 			Handler:    _Storage_Get_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Put",
 | |
| 			Handler:    _Storage_Put_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Delete",
 | |
| 			Handler:    _Storage_Delete_Handler,
 | |
| 		},
 | |
| 	},
 | |
| 	Streams:  []grpc.StreamDesc{},
 | |
| 	Metadata: "sdk/plugin/pb/backend.proto",
 | |
| }
 | |
| 
 | |
| // SystemViewClient is the client API for SystemView service.
 | |
| //
 | |
| // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
 | |
| type SystemViewClient interface {
 | |
| 	// DefaultLeaseTTL returns the default lease TTL set in Vault configuration
 | |
| 	DefaultLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error)
 | |
| 	// MaxLeaseTTL returns the max lease TTL set in Vault configuration; backend
 | |
| 	// authors should take care not to issue credentials that last longer than
 | |
| 	// this value, as Vault will revoke them
 | |
| 	MaxLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error)
 | |
| 	// Tainted, returns true if the mount is tainted. A mount is tainted if it is in the
 | |
| 	// process of being unmounted. This should only be used in special
 | |
| 	// circumstances; a primary use-case is as a guard in revocation functions.
 | |
| 	// If revocation of a backend's leases fails it can keep the unmounting
 | |
| 	// process from being successful. If the reason for this failure is not
 | |
| 	// relevant when the mount is tainted (for instance, saving a CRL to disk
 | |
| 	// when the stored CRL will be removed during the unmounting process
 | |
| 	// anyways), we can ignore the errors to allow unmounting to complete.
 | |
| 	Tainted(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TaintedReply, error)
 | |
| 	// CachingDisabled returns true if caching is disabled. If true, no caches
 | |
| 	// should be used, despite known slowdowns.
 | |
| 	CachingDisabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CachingDisabledReply, error)
 | |
| 	// ReplicationState indicates the state of cluster replication
 | |
| 	ReplicationState(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReplicationStateReply, error)
 | |
| 	// ResponseWrapData wraps the given data in a cubbyhole and returns the
 | |
| 	// token used to unwrap.
 | |
| 	ResponseWrapData(ctx context.Context, in *ResponseWrapDataArgs, opts ...grpc.CallOption) (*ResponseWrapDataReply, error)
 | |
| 	// MlockEnabled returns the configuration setting for enabling mlock on
 | |
| 	// plugins.
 | |
| 	MlockEnabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*MlockEnabledReply, error)
 | |
| 	// LocalMount, when run from a system view attached to a request, indicates
 | |
| 	// whether the request is affecting a local mount or not
 | |
| 	LocalMount(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*LocalMountReply, error)
 | |
| 	// EntityInfo returns the basic entity information for the given entity id
 | |
| 	EntityInfo(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*EntityInfoReply, error)
 | |
| 	// PluginEnv returns Vault environment information used by plugins
 | |
| 	PluginEnv(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*PluginEnvReply, error)
 | |
| 	// GroupsForEntity returns the group membership information for the given
 | |
| 	// entity id
 | |
| 	GroupsForEntity(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*GroupsForEntityReply, error)
 | |
| 	// GeneratePasswordFromPolicy generates a password from an existing password policy
 | |
| 	GeneratePasswordFromPolicy(ctx context.Context, in *GeneratePasswordFromPolicyRequest, opts ...grpc.CallOption) (*GeneratePasswordFromPolicyReply, error)
 | |
| }
 | |
| 
 | |
| type systemViewClient struct {
 | |
| 	cc grpc.ClientConnInterface
 | |
| }
 | |
| 
 | |
| func NewSystemViewClient(cc grpc.ClientConnInterface) SystemViewClient {
 | |
| 	return &systemViewClient{cc}
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) DefaultLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error) {
 | |
| 	out := new(TTLReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/DefaultLeaseTTL", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) MaxLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error) {
 | |
| 	out := new(TTLReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/MaxLeaseTTL", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) Tainted(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TaintedReply, error) {
 | |
| 	out := new(TaintedReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/Tainted", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) CachingDisabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CachingDisabledReply, error) {
 | |
| 	out := new(CachingDisabledReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/CachingDisabled", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) ReplicationState(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReplicationStateReply, error) {
 | |
| 	out := new(ReplicationStateReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/ReplicationState", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) ResponseWrapData(ctx context.Context, in *ResponseWrapDataArgs, opts ...grpc.CallOption) (*ResponseWrapDataReply, error) {
 | |
| 	out := new(ResponseWrapDataReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/ResponseWrapData", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) MlockEnabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*MlockEnabledReply, error) {
 | |
| 	out := new(MlockEnabledReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/MlockEnabled", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) LocalMount(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*LocalMountReply, error) {
 | |
| 	out := new(LocalMountReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/LocalMount", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) EntityInfo(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*EntityInfoReply, error) {
 | |
| 	out := new(EntityInfoReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/EntityInfo", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) PluginEnv(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*PluginEnvReply, error) {
 | |
| 	out := new(PluginEnvReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/PluginEnv", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) GroupsForEntity(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*GroupsForEntityReply, error) {
 | |
| 	out := new(GroupsForEntityReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/GroupsForEntity", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| func (c *systemViewClient) GeneratePasswordFromPolicy(ctx context.Context, in *GeneratePasswordFromPolicyRequest, opts ...grpc.CallOption) (*GeneratePasswordFromPolicyReply, error) {
 | |
| 	out := new(GeneratePasswordFromPolicyReply)
 | |
| 	err := c.cc.Invoke(ctx, "/pb.SystemView/GeneratePasswordFromPolicy", in, out, opts...)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return out, nil
 | |
| }
 | |
| 
 | |
| // SystemViewServer is the server API for SystemView service.
 | |
| // All implementations must embed UnimplementedSystemViewServer
 | |
| // for forward compatibility
 | |
| type SystemViewServer interface {
 | |
| 	// DefaultLeaseTTL returns the default lease TTL set in Vault configuration
 | |
| 	DefaultLeaseTTL(context.Context, *Empty) (*TTLReply, error)
 | |
| 	// MaxLeaseTTL returns the max lease TTL set in Vault configuration; backend
 | |
| 	// authors should take care not to issue credentials that last longer than
 | |
| 	// this value, as Vault will revoke them
 | |
| 	MaxLeaseTTL(context.Context, *Empty) (*TTLReply, error)
 | |
| 	// Tainted, returns true if the mount is tainted. A mount is tainted if it is in the
 | |
| 	// process of being unmounted. This should only be used in special
 | |
| 	// circumstances; a primary use-case is as a guard in revocation functions.
 | |
| 	// If revocation of a backend's leases fails it can keep the unmounting
 | |
| 	// process from being successful. If the reason for this failure is not
 | |
| 	// relevant when the mount is tainted (for instance, saving a CRL to disk
 | |
| 	// when the stored CRL will be removed during the unmounting process
 | |
| 	// anyways), we can ignore the errors to allow unmounting to complete.
 | |
| 	Tainted(context.Context, *Empty) (*TaintedReply, error)
 | |
| 	// CachingDisabled returns true if caching is disabled. If true, no caches
 | |
| 	// should be used, despite known slowdowns.
 | |
| 	CachingDisabled(context.Context, *Empty) (*CachingDisabledReply, error)
 | |
| 	// ReplicationState indicates the state of cluster replication
 | |
| 	ReplicationState(context.Context, *Empty) (*ReplicationStateReply, error)
 | |
| 	// ResponseWrapData wraps the given data in a cubbyhole and returns the
 | |
| 	// token used to unwrap.
 | |
| 	ResponseWrapData(context.Context, *ResponseWrapDataArgs) (*ResponseWrapDataReply, error)
 | |
| 	// MlockEnabled returns the configuration setting for enabling mlock on
 | |
| 	// plugins.
 | |
| 	MlockEnabled(context.Context, *Empty) (*MlockEnabledReply, error)
 | |
| 	// LocalMount, when run from a system view attached to a request, indicates
 | |
| 	// whether the request is affecting a local mount or not
 | |
| 	LocalMount(context.Context, *Empty) (*LocalMountReply, error)
 | |
| 	// EntityInfo returns the basic entity information for the given entity id
 | |
| 	EntityInfo(context.Context, *EntityInfoArgs) (*EntityInfoReply, error)
 | |
| 	// PluginEnv returns Vault environment information used by plugins
 | |
| 	PluginEnv(context.Context, *Empty) (*PluginEnvReply, error)
 | |
| 	// GroupsForEntity returns the group membership information for the given
 | |
| 	// entity id
 | |
| 	GroupsForEntity(context.Context, *EntityInfoArgs) (*GroupsForEntityReply, error)
 | |
| 	// GeneratePasswordFromPolicy generates a password from an existing password policy
 | |
| 	GeneratePasswordFromPolicy(context.Context, *GeneratePasswordFromPolicyRequest) (*GeneratePasswordFromPolicyReply, error)
 | |
| 	mustEmbedUnimplementedSystemViewServer()
 | |
| }
 | |
| 
 | |
| // UnimplementedSystemViewServer must be embedded to have forward compatible implementations.
 | |
| type UnimplementedSystemViewServer struct {
 | |
| }
 | |
| 
 | |
| func (UnimplementedSystemViewServer) DefaultLeaseTTL(context.Context, *Empty) (*TTLReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method DefaultLeaseTTL not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) MaxLeaseTTL(context.Context, *Empty) (*TTLReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method MaxLeaseTTL not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) Tainted(context.Context, *Empty) (*TaintedReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method Tainted not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) CachingDisabled(context.Context, *Empty) (*CachingDisabledReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method CachingDisabled not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) ReplicationState(context.Context, *Empty) (*ReplicationStateReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method ReplicationState not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) ResponseWrapData(context.Context, *ResponseWrapDataArgs) (*ResponseWrapDataReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method ResponseWrapData not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) MlockEnabled(context.Context, *Empty) (*MlockEnabledReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method MlockEnabled not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) LocalMount(context.Context, *Empty) (*LocalMountReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method LocalMount not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) EntityInfo(context.Context, *EntityInfoArgs) (*EntityInfoReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method EntityInfo not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) PluginEnv(context.Context, *Empty) (*PluginEnvReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method PluginEnv not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) GroupsForEntity(context.Context, *EntityInfoArgs) (*GroupsForEntityReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method GroupsForEntity not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) GeneratePasswordFromPolicy(context.Context, *GeneratePasswordFromPolicyRequest) (*GeneratePasswordFromPolicyReply, error) {
 | |
| 	return nil, status.Errorf(codes.Unimplemented, "method GeneratePasswordFromPolicy not implemented")
 | |
| }
 | |
| func (UnimplementedSystemViewServer) mustEmbedUnimplementedSystemViewServer() {}
 | |
| 
 | |
| // UnsafeSystemViewServer may be embedded to opt out of forward compatibility for this service.
 | |
| // Use of this interface is not recommended, as added methods to SystemViewServer will
 | |
| // result in compilation errors.
 | |
| type UnsafeSystemViewServer interface {
 | |
| 	mustEmbedUnimplementedSystemViewServer()
 | |
| }
 | |
| 
 | |
| func RegisterSystemViewServer(s grpc.ServiceRegistrar, srv SystemViewServer) {
 | |
| 	s.RegisterService(&SystemView_ServiceDesc, srv)
 | |
| }
 | |
| 
 | |
| func _SystemView_DefaultLeaseTTL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).DefaultLeaseTTL(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/DefaultLeaseTTL",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).DefaultLeaseTTL(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_MaxLeaseTTL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).MaxLeaseTTL(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/MaxLeaseTTL",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).MaxLeaseTTL(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_Tainted_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).Tainted(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/Tainted",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).Tainted(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_CachingDisabled_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).CachingDisabled(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/CachingDisabled",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).CachingDisabled(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_ReplicationState_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).ReplicationState(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/ReplicationState",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).ReplicationState(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_ResponseWrapData_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(ResponseWrapDataArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).ResponseWrapData(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/ResponseWrapData",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).ResponseWrapData(ctx, req.(*ResponseWrapDataArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_MlockEnabled_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).MlockEnabled(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/MlockEnabled",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).MlockEnabled(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_LocalMount_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).LocalMount(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/LocalMount",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).LocalMount(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_EntityInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(EntityInfoArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).EntityInfo(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/EntityInfo",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).EntityInfo(ctx, req.(*EntityInfoArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_PluginEnv_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(Empty)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).PluginEnv(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/PluginEnv",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).PluginEnv(ctx, req.(*Empty))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_GroupsForEntity_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(EntityInfoArgs)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).GroupsForEntity(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/GroupsForEntity",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).GroupsForEntity(ctx, req.(*EntityInfoArgs))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| func _SystemView_GeneratePasswordFromPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
 | |
| 	in := new(GeneratePasswordFromPolicyRequest)
 | |
| 	if err := dec(in); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if interceptor == nil {
 | |
| 		return srv.(SystemViewServer).GeneratePasswordFromPolicy(ctx, in)
 | |
| 	}
 | |
| 	info := &grpc.UnaryServerInfo{
 | |
| 		Server:     srv,
 | |
| 		FullMethod: "/pb.SystemView/GeneratePasswordFromPolicy",
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
 | |
| 		return srv.(SystemViewServer).GeneratePasswordFromPolicy(ctx, req.(*GeneratePasswordFromPolicyRequest))
 | |
| 	}
 | |
| 	return interceptor(ctx, in, info, handler)
 | |
| }
 | |
| 
 | |
| // SystemView_ServiceDesc is the grpc.ServiceDesc for SystemView service.
 | |
| // It's only intended for direct use with grpc.RegisterService,
 | |
| // and not to be introspected or modified (even as a copy)
 | |
| var SystemView_ServiceDesc = grpc.ServiceDesc{
 | |
| 	ServiceName: "pb.SystemView",
 | |
| 	HandlerType: (*SystemViewServer)(nil),
 | |
| 	Methods: []grpc.MethodDesc{
 | |
| 		{
 | |
| 			MethodName: "DefaultLeaseTTL",
 | |
| 			Handler:    _SystemView_DefaultLeaseTTL_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "MaxLeaseTTL",
 | |
| 			Handler:    _SystemView_MaxLeaseTTL_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "Tainted",
 | |
| 			Handler:    _SystemView_Tainted_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "CachingDisabled",
 | |
| 			Handler:    _SystemView_CachingDisabled_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "ReplicationState",
 | |
| 			Handler:    _SystemView_ReplicationState_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "ResponseWrapData",
 | |
| 			Handler:    _SystemView_ResponseWrapData_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "MlockEnabled",
 | |
| 			Handler:    _SystemView_MlockEnabled_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "LocalMount",
 | |
| 			Handler:    _SystemView_LocalMount_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "EntityInfo",
 | |
| 			Handler:    _SystemView_EntityInfo_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "PluginEnv",
 | |
| 			Handler:    _SystemView_PluginEnv_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "GroupsForEntity",
 | |
| 			Handler:    _SystemView_GroupsForEntity_Handler,
 | |
| 		},
 | |
| 		{
 | |
| 			MethodName: "GeneratePasswordFromPolicy",
 | |
| 			Handler:    _SystemView_GeneratePasswordFromPolicy_Handler,
 | |
| 		},
 | |
| 	},
 | |
| 	Streams:  []grpc.StreamDesc{},
 | |
| 	Metadata: "sdk/plugin/pb/backend.proto",
 | |
| }
 | 
