mirror of
https://github.com/TeaOSLab/EdgeCommon.git
synced 2025-12-13 04:00:26 +08:00
使用最新的protoc-gen-go和protoc-gen-go-grpc插件
This commit is contained in:
@@ -1,17 +1,12 @@
|
||||
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||
// versions:
|
||||
// protoc-gen-go v1.25.0
|
||||
// protoc-gen-go v1.31.0
|
||||
// protoc v3.19.4
|
||||
// source: service_http_firewall_rule_set.proto
|
||||
|
||||
package pb
|
||||
|
||||
import (
|
||||
context "context"
|
||||
proto "github.com/golang/protobuf/proto"
|
||||
grpc "google.golang.org/grpc"
|
||||
codes "google.golang.org/grpc/codes"
|
||||
status "google.golang.org/grpc/status"
|
||||
protoreflect "google.golang.org/protobuf/reflect/protoreflect"
|
||||
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
||||
reflect "reflect"
|
||||
@@ -25,10 +20,6 @@ const (
|
||||
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
|
||||
)
|
||||
|
||||
// This is a compile-time assertion that a sufficiently up-to-date version
|
||||
// of the legacy proto package is being used.
|
||||
const _ = proto.ProtoPackageIsVersion4
|
||||
|
||||
// 根据配置创建或修改规则集
|
||||
type CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest struct {
|
||||
state protoimpl.MessageState
|
||||
@@ -615,199 +606,3 @@ func file_service_http_firewall_rule_set_proto_init() {
|
||||
file_service_http_firewall_rule_set_proto_goTypes = nil
|
||||
file_service_http_firewall_rule_set_proto_depIdxs = nil
|
||||
}
|
||||
|
||||
// Reference imports to suppress errors if they are not otherwise used.
|
||||
var _ context.Context
|
||||
var _ grpc.ClientConnInterface
|
||||
|
||||
// This is a compile-time assertion to ensure that this generated file
|
||||
// is compatible with the grpc package it is being compiled against.
|
||||
const _ = grpc.SupportPackageIsVersion6
|
||||
|
||||
// HTTPFirewallRuleSetServiceClient is the client API for HTTPFirewallRuleSetService service.
|
||||
//
|
||||
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
|
||||
type HTTPFirewallRuleSetServiceClient interface {
|
||||
// 根据配置创建或修改规则集
|
||||
CreateOrUpdateHTTPFirewallRuleSetFromConfig(ctx context.Context, in *CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest, opts ...grpc.CallOption) (*CreateOrUpdateHTTPFirewallRuleSetFromConfigResponse, error)
|
||||
// 设置开启状态
|
||||
UpdateHTTPFirewallRuleSetIsOn(ctx context.Context, in *UpdateHTTPFirewallRuleSetIsOnRequest, opts ...grpc.CallOption) (*RPCSuccess, error)
|
||||
// 查找规则集配置
|
||||
FindEnabledHTTPFirewallRuleSetConfig(ctx context.Context, in *FindEnabledHTTPFirewallRuleSetConfigRequest, opts ...grpc.CallOption) (*FindEnabledHTTPFirewallRuleSetConfigResponse, error)
|
||||
// 查找规则集信息
|
||||
FindEnabledHTTPFirewallRuleSet(ctx context.Context, in *FindEnabledHTTPFirewallRuleSetRequest, opts ...grpc.CallOption) (*FindEnabledHTTPFirewallRuleSetResponse, error)
|
||||
}
|
||||
|
||||
type hTTPFirewallRuleSetServiceClient struct {
|
||||
cc grpc.ClientConnInterface
|
||||
}
|
||||
|
||||
func NewHTTPFirewallRuleSetServiceClient(cc grpc.ClientConnInterface) HTTPFirewallRuleSetServiceClient {
|
||||
return &hTTPFirewallRuleSetServiceClient{cc}
|
||||
}
|
||||
|
||||
func (c *hTTPFirewallRuleSetServiceClient) CreateOrUpdateHTTPFirewallRuleSetFromConfig(ctx context.Context, in *CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest, opts ...grpc.CallOption) (*CreateOrUpdateHTTPFirewallRuleSetFromConfigResponse, error) {
|
||||
out := new(CreateOrUpdateHTTPFirewallRuleSetFromConfigResponse)
|
||||
err := c.cc.Invoke(ctx, "/pb.HTTPFirewallRuleSetService/createOrUpdateHTTPFirewallRuleSetFromConfig", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return out, nil
|
||||
}
|
||||
|
||||
func (c *hTTPFirewallRuleSetServiceClient) UpdateHTTPFirewallRuleSetIsOn(ctx context.Context, in *UpdateHTTPFirewallRuleSetIsOnRequest, opts ...grpc.CallOption) (*RPCSuccess, error) {
|
||||
out := new(RPCSuccess)
|
||||
err := c.cc.Invoke(ctx, "/pb.HTTPFirewallRuleSetService/updateHTTPFirewallRuleSetIsOn", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return out, nil
|
||||
}
|
||||
|
||||
func (c *hTTPFirewallRuleSetServiceClient) FindEnabledHTTPFirewallRuleSetConfig(ctx context.Context, in *FindEnabledHTTPFirewallRuleSetConfigRequest, opts ...grpc.CallOption) (*FindEnabledHTTPFirewallRuleSetConfigResponse, error) {
|
||||
out := new(FindEnabledHTTPFirewallRuleSetConfigResponse)
|
||||
err := c.cc.Invoke(ctx, "/pb.HTTPFirewallRuleSetService/findEnabledHTTPFirewallRuleSetConfig", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return out, nil
|
||||
}
|
||||
|
||||
func (c *hTTPFirewallRuleSetServiceClient) FindEnabledHTTPFirewallRuleSet(ctx context.Context, in *FindEnabledHTTPFirewallRuleSetRequest, opts ...grpc.CallOption) (*FindEnabledHTTPFirewallRuleSetResponse, error) {
|
||||
out := new(FindEnabledHTTPFirewallRuleSetResponse)
|
||||
err := c.cc.Invoke(ctx, "/pb.HTTPFirewallRuleSetService/findEnabledHTTPFirewallRuleSet", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return out, nil
|
||||
}
|
||||
|
||||
// HTTPFirewallRuleSetServiceServer is the server API for HTTPFirewallRuleSetService service.
|
||||
type HTTPFirewallRuleSetServiceServer interface {
|
||||
// 根据配置创建或修改规则集
|
||||
CreateOrUpdateHTTPFirewallRuleSetFromConfig(context.Context, *CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest) (*CreateOrUpdateHTTPFirewallRuleSetFromConfigResponse, error)
|
||||
// 设置开启状态
|
||||
UpdateHTTPFirewallRuleSetIsOn(context.Context, *UpdateHTTPFirewallRuleSetIsOnRequest) (*RPCSuccess, error)
|
||||
// 查找规则集配置
|
||||
FindEnabledHTTPFirewallRuleSetConfig(context.Context, *FindEnabledHTTPFirewallRuleSetConfigRequest) (*FindEnabledHTTPFirewallRuleSetConfigResponse, error)
|
||||
// 查找规则集信息
|
||||
FindEnabledHTTPFirewallRuleSet(context.Context, *FindEnabledHTTPFirewallRuleSetRequest) (*FindEnabledHTTPFirewallRuleSetResponse, error)
|
||||
}
|
||||
|
||||
// UnimplementedHTTPFirewallRuleSetServiceServer can be embedded to have forward compatible implementations.
|
||||
type UnimplementedHTTPFirewallRuleSetServiceServer struct {
|
||||
}
|
||||
|
||||
func (*UnimplementedHTTPFirewallRuleSetServiceServer) CreateOrUpdateHTTPFirewallRuleSetFromConfig(context.Context, *CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest) (*CreateOrUpdateHTTPFirewallRuleSetFromConfigResponse, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method CreateOrUpdateHTTPFirewallRuleSetFromConfig not implemented")
|
||||
}
|
||||
func (*UnimplementedHTTPFirewallRuleSetServiceServer) UpdateHTTPFirewallRuleSetIsOn(context.Context, *UpdateHTTPFirewallRuleSetIsOnRequest) (*RPCSuccess, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method UpdateHTTPFirewallRuleSetIsOn not implemented")
|
||||
}
|
||||
func (*UnimplementedHTTPFirewallRuleSetServiceServer) FindEnabledHTTPFirewallRuleSetConfig(context.Context, *FindEnabledHTTPFirewallRuleSetConfigRequest) (*FindEnabledHTTPFirewallRuleSetConfigResponse, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method FindEnabledHTTPFirewallRuleSetConfig not implemented")
|
||||
}
|
||||
func (*UnimplementedHTTPFirewallRuleSetServiceServer) FindEnabledHTTPFirewallRuleSet(context.Context, *FindEnabledHTTPFirewallRuleSetRequest) (*FindEnabledHTTPFirewallRuleSetResponse, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method FindEnabledHTTPFirewallRuleSet not implemented")
|
||||
}
|
||||
|
||||
func RegisterHTTPFirewallRuleSetServiceServer(s *grpc.Server, srv HTTPFirewallRuleSetServiceServer) {
|
||||
s.RegisterService(&_HTTPFirewallRuleSetService_serviceDesc, srv)
|
||||
}
|
||||
|
||||
func _HTTPFirewallRuleSetService_CreateOrUpdateHTTPFirewallRuleSetFromConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||||
in := new(CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest)
|
||||
if err := dec(in); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if interceptor == nil {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).CreateOrUpdateHTTPFirewallRuleSetFromConfig(ctx, in)
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/pb.HTTPFirewallRuleSetService/CreateOrUpdateHTTPFirewallRuleSetFromConfig",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).CreateOrUpdateHTTPFirewallRuleSetFromConfig(ctx, req.(*CreateOrUpdateHTTPFirewallRuleSetFromConfigRequest))
|
||||
}
|
||||
return interceptor(ctx, in, info, handler)
|
||||
}
|
||||
|
||||
func _HTTPFirewallRuleSetService_UpdateHTTPFirewallRuleSetIsOn_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||||
in := new(UpdateHTTPFirewallRuleSetIsOnRequest)
|
||||
if err := dec(in); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if interceptor == nil {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).UpdateHTTPFirewallRuleSetIsOn(ctx, in)
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/pb.HTTPFirewallRuleSetService/UpdateHTTPFirewallRuleSetIsOn",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).UpdateHTTPFirewallRuleSetIsOn(ctx, req.(*UpdateHTTPFirewallRuleSetIsOnRequest))
|
||||
}
|
||||
return interceptor(ctx, in, info, handler)
|
||||
}
|
||||
|
||||
func _HTTPFirewallRuleSetService_FindEnabledHTTPFirewallRuleSetConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||||
in := new(FindEnabledHTTPFirewallRuleSetConfigRequest)
|
||||
if err := dec(in); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if interceptor == nil {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).FindEnabledHTTPFirewallRuleSetConfig(ctx, in)
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/pb.HTTPFirewallRuleSetService/FindEnabledHTTPFirewallRuleSetConfig",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).FindEnabledHTTPFirewallRuleSetConfig(ctx, req.(*FindEnabledHTTPFirewallRuleSetConfigRequest))
|
||||
}
|
||||
return interceptor(ctx, in, info, handler)
|
||||
}
|
||||
|
||||
func _HTTPFirewallRuleSetService_FindEnabledHTTPFirewallRuleSet_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||||
in := new(FindEnabledHTTPFirewallRuleSetRequest)
|
||||
if err := dec(in); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if interceptor == nil {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).FindEnabledHTTPFirewallRuleSet(ctx, in)
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/pb.HTTPFirewallRuleSetService/FindEnabledHTTPFirewallRuleSet",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(HTTPFirewallRuleSetServiceServer).FindEnabledHTTPFirewallRuleSet(ctx, req.(*FindEnabledHTTPFirewallRuleSetRequest))
|
||||
}
|
||||
return interceptor(ctx, in, info, handler)
|
||||
}
|
||||
|
||||
var _HTTPFirewallRuleSetService_serviceDesc = grpc.ServiceDesc{
|
||||
ServiceName: "pb.HTTPFirewallRuleSetService",
|
||||
HandlerType: (*HTTPFirewallRuleSetServiceServer)(nil),
|
||||
Methods: []grpc.MethodDesc{
|
||||
{
|
||||
MethodName: "createOrUpdateHTTPFirewallRuleSetFromConfig",
|
||||
Handler: _HTTPFirewallRuleSetService_CreateOrUpdateHTTPFirewallRuleSetFromConfig_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "updateHTTPFirewallRuleSetIsOn",
|
||||
Handler: _HTTPFirewallRuleSetService_UpdateHTTPFirewallRuleSetIsOn_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "findEnabledHTTPFirewallRuleSetConfig",
|
||||
Handler: _HTTPFirewallRuleSetService_FindEnabledHTTPFirewallRuleSetConfig_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "findEnabledHTTPFirewallRuleSet",
|
||||
Handler: _HTTPFirewallRuleSetService_FindEnabledHTTPFirewallRuleSet_Handler,
|
||||
},
|
||||
},
|
||||
Streams: []grpc.StreamDesc{},
|
||||
Metadata: "service_http_firewall_rule_set.proto",
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user