// Code generated by protoc-gen-go-grpc. DO NOT EDIT. // versions: // - protoc-gen-go-grpc v1.6.1 // - protoc v7.34.1 // source: management.proto package proto import ( context "context" grpc "google.golang.org/grpc" codes "google.golang.org/grpc/codes" status "google.golang.org/grpc/status" ) // This is a compile-time assertion to ensure that this generated file // is compatible with the grpc package it is being compiled against. // Requires gRPC-Go v1.64.0 or later. const _ = grpc.SupportPackageIsVersion9 const ( ManagementService_Login_FullMethodName = "/management.ManagementService/Login" ManagementService_Sync_FullMethodName = "/management.ManagementService/Sync" ManagementService_GetServerKey_FullMethodName = "/management.ManagementService/GetServerKey" ManagementService_IsHealthy_FullMethodName = "/management.ManagementService/isHealthy" ManagementService_GetDeviceAuthorizationFlow_FullMethodName = "/management.ManagementService/GetDeviceAuthorizationFlow" ManagementService_GetPKCEAuthorizationFlow_FullMethodName = "/management.ManagementService/GetPKCEAuthorizationFlow" ManagementService_SyncMeta_FullMethodName = "/management.ManagementService/SyncMeta" ManagementService_Logout_FullMethodName = "/management.ManagementService/Logout" ManagementService_Job_FullMethodName = "/management.ManagementService/Job" ManagementService_CreateExpose_FullMethodName = "/management.ManagementService/CreateExpose" ManagementService_RenewExpose_FullMethodName = "/management.ManagementService/RenewExpose" ManagementService_StopExpose_FullMethodName = "/management.ManagementService/StopExpose" ) // ManagementServiceClient is the client API for ManagementService service. // // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream. type ManagementServiceClient interface { // Login logs in peer. In case server returns codes.PermissionDenied this endpoint can be used to register Peer providing LoginRequest.setupKey // Returns encrypted LoginResponse in EncryptedMessage.Body Login(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) // Sync enables peer synchronization. Each peer that is connected to this stream will receive updates from the server. // For example, if a new peer has been added to an account all other connected peers will receive this peer's Wireguard public key as an update // The initial SyncResponse contains all of the available peers so the local state can be refreshed // Returns encrypted SyncResponse in EncryptedMessage.Body Sync(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (grpc.ServerStreamingClient[EncryptedMessage], error) // Exposes a Wireguard public key of the Management service. // This key is used to support message encryption between client and server GetServerKey(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ServerKeyResponse, error) // health check endpoint IsHealthy(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) // Exposes a device authorization flow information // This is used for initiating a Oauth 2 device authorization grant flow // which will be used by our clients to Login. // EncryptedMessage of the request has a body of DeviceAuthorizationFlowRequest. // EncryptedMessage of the response has a body of DeviceAuthorizationFlow. GetDeviceAuthorizationFlow(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) // Exposes a PKCE authorization code flow information // This is used for initiating a Oauth 2 authorization grant flow // with Proof Key for Code Exchange (PKCE) which will be used by our clients to Login. // EncryptedMessage of the request has a body of PKCEAuthorizationFlowRequest. // EncryptedMessage of the response has a body of PKCEAuthorizationFlow. GetPKCEAuthorizationFlow(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) // SyncMeta is used to sync metadata of the peer. // After sync the peer if there is a change in peer posture check which needs to be evaluated by the client, // sync meta will evaluate the checks and update the peer meta with the result. // EncryptedMessage of the request has a body of Empty. SyncMeta(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*Empty, error) // Logout logs out the peer and removes it from the management server Logout(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*Empty, error) // Executes a job on a target peer (e.g., debug bundle) Job(ctx context.Context, opts ...grpc.CallOption) (grpc.BidiStreamingClient[EncryptedMessage, EncryptedMessage], error) // CreateExpose creates a temporary reverse proxy service for a peer CreateExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) // RenewExpose extends the TTL of an active expose session RenewExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) // StopExpose terminates an active expose session StopExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) } type managementServiceClient struct { cc grpc.ClientConnInterface } func NewManagementServiceClient(cc grpc.ClientConnInterface) ManagementServiceClient { return &managementServiceClient{cc} } func (c *managementServiceClient) Login(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_Login_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) Sync(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (grpc.ServerStreamingClient[EncryptedMessage], error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) stream, err := c.cc.NewStream(ctx, &ManagementService_ServiceDesc.Streams[0], ManagementService_Sync_FullMethodName, cOpts...) if err != nil { return nil, err } x := &grpc.GenericClientStream[EncryptedMessage, EncryptedMessage]{ClientStream: stream} if err := x.ClientStream.SendMsg(in); err != nil { return nil, err } if err := x.ClientStream.CloseSend(); err != nil { return nil, err } return x, nil } // This type alias is provided for backwards compatibility with existing code that references the prior non-generic stream type by name. type ManagementService_SyncClient = grpc.ServerStreamingClient[EncryptedMessage] func (c *managementServiceClient) GetServerKey(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ServerKeyResponse, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(ServerKeyResponse) err := c.cc.Invoke(ctx, ManagementService_GetServerKey_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) IsHealthy(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(Empty) err := c.cc.Invoke(ctx, ManagementService_IsHealthy_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) GetDeviceAuthorizationFlow(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_GetDeviceAuthorizationFlow_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) GetPKCEAuthorizationFlow(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_GetPKCEAuthorizationFlow_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) SyncMeta(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*Empty, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(Empty) err := c.cc.Invoke(ctx, ManagementService_SyncMeta_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) Logout(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*Empty, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(Empty) err := c.cc.Invoke(ctx, ManagementService_Logout_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) Job(ctx context.Context, opts ...grpc.CallOption) (grpc.BidiStreamingClient[EncryptedMessage, EncryptedMessage], error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) stream, err := c.cc.NewStream(ctx, &ManagementService_ServiceDesc.Streams[1], ManagementService_Job_FullMethodName, cOpts...) if err != nil { return nil, err } x := &grpc.GenericClientStream[EncryptedMessage, EncryptedMessage]{ClientStream: stream} return x, nil } // This type alias is provided for backwards compatibility with existing code that references the prior non-generic stream type by name. type ManagementService_JobClient = grpc.BidiStreamingClient[EncryptedMessage, EncryptedMessage] func (c *managementServiceClient) CreateExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_CreateExpose_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) RenewExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_RenewExpose_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } func (c *managementServiceClient) StopExpose(ctx context.Context, in *EncryptedMessage, opts ...grpc.CallOption) (*EncryptedMessage, error) { cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...) out := new(EncryptedMessage) err := c.cc.Invoke(ctx, ManagementService_StopExpose_FullMethodName, in, out, cOpts...) if err != nil { return nil, err } return out, nil } // ManagementServiceServer is the server API for ManagementService service. // All implementations must embed UnimplementedManagementServiceServer // for forward compatibility. type ManagementServiceServer interface { // Login logs in peer. In case server returns codes.PermissionDenied this endpoint can be used to register Peer providing LoginRequest.setupKey // Returns encrypted LoginResponse in EncryptedMessage.Body Login(context.Context, *EncryptedMessage) (*EncryptedMessage, error) // Sync enables peer synchronization. Each peer that is connected to this stream will receive updates from the server. // For example, if a new peer has been added to an account all other connected peers will receive this peer's Wireguard public key as an update // The initial SyncResponse contains all of the available peers so the local state can be refreshed // Returns encrypted SyncResponse in EncryptedMessage.Body Sync(*EncryptedMessage, grpc.ServerStreamingServer[EncryptedMessage]) error // Exposes a Wireguard public key of the Management service. // This key is used to support message encryption between client and server GetServerKey(context.Context, *Empty) (*ServerKeyResponse, error) // health check endpoint IsHealthy(context.Context, *Empty) (*Empty, error) // Exposes a device authorization flow information // This is used for initiating a Oauth 2 device authorization grant flow // which will be used by our clients to Login. // EncryptedMessage of the request has a body of DeviceAuthorizationFlowRequest. // EncryptedMessage of the response has a body of DeviceAuthorizationFlow. GetDeviceAuthorizationFlow(context.Context, *EncryptedMessage) (*EncryptedMessage, error) // Exposes a PKCE authorization code flow information // This is used for initiating a Oauth 2 authorization grant flow // with Proof Key for Code Exchange (PKCE) which will be used by our clients to Login. // EncryptedMessage of the request has a body of PKCEAuthorizationFlowRequest. // EncryptedMessage of the response has a body of PKCEAuthorizationFlow. GetPKCEAuthorizationFlow(context.Context, *EncryptedMessage) (*EncryptedMessage, error) // SyncMeta is used to sync metadata of the peer. // After sync the peer if there is a change in peer posture check which needs to be evaluated by the client, // sync meta will evaluate the checks and update the peer meta with the result. // EncryptedMessage of the request has a body of Empty. SyncMeta(context.Context, *EncryptedMessage) (*Empty, error) // Logout logs out the peer and removes it from the management server Logout(context.Context, *EncryptedMessage) (*Empty, error) // Executes a job on a target peer (e.g., debug bundle) Job(grpc.BidiStreamingServer[EncryptedMessage, EncryptedMessage]) error // CreateExpose creates a temporary reverse proxy service for a peer CreateExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) // RenewExpose extends the TTL of an active expose session RenewExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) // StopExpose terminates an active expose session StopExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) mustEmbedUnimplementedManagementServiceServer() } // UnimplementedManagementServiceServer must be embedded to have // forward compatible implementations. // // NOTE: this should be embedded by value instead of pointer to avoid a nil // pointer dereference when methods are called. type UnimplementedManagementServiceServer struct{} func (UnimplementedManagementServiceServer) Login(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method Login not implemented") } func (UnimplementedManagementServiceServer) Sync(*EncryptedMessage, grpc.ServerStreamingServer[EncryptedMessage]) error { return status.Error(codes.Unimplemented, "method Sync not implemented") } func (UnimplementedManagementServiceServer) GetServerKey(context.Context, *Empty) (*ServerKeyResponse, error) { return nil, status.Error(codes.Unimplemented, "method GetServerKey not implemented") } func (UnimplementedManagementServiceServer) IsHealthy(context.Context, *Empty) (*Empty, error) { return nil, status.Error(codes.Unimplemented, "method IsHealthy not implemented") } func (UnimplementedManagementServiceServer) GetDeviceAuthorizationFlow(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method GetDeviceAuthorizationFlow not implemented") } func (UnimplementedManagementServiceServer) GetPKCEAuthorizationFlow(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method GetPKCEAuthorizationFlow not implemented") } func (UnimplementedManagementServiceServer) SyncMeta(context.Context, *EncryptedMessage) (*Empty, error) { return nil, status.Error(codes.Unimplemented, "method SyncMeta not implemented") } func (UnimplementedManagementServiceServer) Logout(context.Context, *EncryptedMessage) (*Empty, error) { return nil, status.Error(codes.Unimplemented, "method Logout not implemented") } func (UnimplementedManagementServiceServer) Job(grpc.BidiStreamingServer[EncryptedMessage, EncryptedMessage]) error { return status.Error(codes.Unimplemented, "method Job not implemented") } func (UnimplementedManagementServiceServer) CreateExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method CreateExpose not implemented") } func (UnimplementedManagementServiceServer) RenewExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method RenewExpose not implemented") } func (UnimplementedManagementServiceServer) StopExpose(context.Context, *EncryptedMessage) (*EncryptedMessage, error) { return nil, status.Error(codes.Unimplemented, "method StopExpose not implemented") } func (UnimplementedManagementServiceServer) mustEmbedUnimplementedManagementServiceServer() {} func (UnimplementedManagementServiceServer) testEmbeddedByValue() {} // UnsafeManagementServiceServer may be embedded to opt out of forward compatibility for this service. // Use of this interface is not recommended, as added methods to ManagementServiceServer will // result in compilation errors. type UnsafeManagementServiceServer interface { mustEmbedUnimplementedManagementServiceServer() } func RegisterManagementServiceServer(s grpc.ServiceRegistrar, srv ManagementServiceServer) { // If the following call panics, it indicates UnimplementedManagementServiceServer was // embedded by pointer and is nil. This will cause panics if an // unimplemented method is ever invoked, so we test this at initialization // time to prevent it from happening at runtime later due to I/O. if t, ok := srv.(interface{ testEmbeddedByValue() }); ok { t.testEmbeddedByValue() } s.RegisterService(&ManagementService_ServiceDesc, srv) } func _ManagementService_Login_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).Login(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_Login_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).Login(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_Sync_Handler(srv interface{}, stream grpc.ServerStream) error { m := new(EncryptedMessage) if err := stream.RecvMsg(m); err != nil { return err } return srv.(ManagementServiceServer).Sync(m, &grpc.GenericServerStream[EncryptedMessage, EncryptedMessage]{ServerStream: stream}) } // This type alias is provided for backwards compatibility with existing code that references the prior non-generic stream type by name. type ManagementService_SyncServer = grpc.ServerStreamingServer[EncryptedMessage] func _ManagementService_GetServerKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(Empty) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).GetServerKey(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_GetServerKey_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).GetServerKey(ctx, req.(*Empty)) } return interceptor(ctx, in, info, handler) } func _ManagementService_IsHealthy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(Empty) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).IsHealthy(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_IsHealthy_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).IsHealthy(ctx, req.(*Empty)) } return interceptor(ctx, in, info, handler) } func _ManagementService_GetDeviceAuthorizationFlow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).GetDeviceAuthorizationFlow(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_GetDeviceAuthorizationFlow_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).GetDeviceAuthorizationFlow(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_GetPKCEAuthorizationFlow_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).GetPKCEAuthorizationFlow(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_GetPKCEAuthorizationFlow_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).GetPKCEAuthorizationFlow(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_SyncMeta_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).SyncMeta(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_SyncMeta_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).SyncMeta(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_Logout_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).Logout(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_Logout_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).Logout(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_Job_Handler(srv interface{}, stream grpc.ServerStream) error { return srv.(ManagementServiceServer).Job(&grpc.GenericServerStream[EncryptedMessage, EncryptedMessage]{ServerStream: stream}) } // This type alias is provided for backwards compatibility with existing code that references the prior non-generic stream type by name. type ManagementService_JobServer = grpc.BidiStreamingServer[EncryptedMessage, EncryptedMessage] func _ManagementService_CreateExpose_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).CreateExpose(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_CreateExpose_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).CreateExpose(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_RenewExpose_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).RenewExpose(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_RenewExpose_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).RenewExpose(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } func _ManagementService_StopExpose_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EncryptedMessage) if err := dec(in); err != nil { return nil, err } if interceptor == nil { return srv.(ManagementServiceServer).StopExpose(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, FullMethod: ManagementService_StopExpose_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { return srv.(ManagementServiceServer).StopExpose(ctx, req.(*EncryptedMessage)) } return interceptor(ctx, in, info, handler) } // ManagementService_ServiceDesc is the grpc.ServiceDesc for ManagementService service. // It's only intended for direct use with grpc.RegisterService, // and not to be introspected or modified (even as a copy) var ManagementService_ServiceDesc = grpc.ServiceDesc{ ServiceName: "management.ManagementService", HandlerType: (*ManagementServiceServer)(nil), Methods: []grpc.MethodDesc{ { MethodName: "Login", Handler: _ManagementService_Login_Handler, }, { MethodName: "GetServerKey", Handler: _ManagementService_GetServerKey_Handler, }, { MethodName: "isHealthy", Handler: _ManagementService_IsHealthy_Handler, }, { MethodName: "GetDeviceAuthorizationFlow", Handler: _ManagementService_GetDeviceAuthorizationFlow_Handler, }, { MethodName: "GetPKCEAuthorizationFlow", Handler: _ManagementService_GetPKCEAuthorizationFlow_Handler, }, { MethodName: "SyncMeta", Handler: _ManagementService_SyncMeta_Handler, }, { MethodName: "Logout", Handler: _ManagementService_Logout_Handler, }, { MethodName: "CreateExpose", Handler: _ManagementService_CreateExpose_Handler, }, { MethodName: "RenewExpose", Handler: _ManagementService_RenewExpose_Handler, }, { MethodName: "StopExpose", Handler: _ManagementService_StopExpose_Handler, }, }, Streams: []grpc.StreamDesc{ { StreamName: "Sync", Handler: _ManagementService_Sync_Handler, ServerStreams: true, }, { StreamName: "Job", Handler: _ManagementService_Job_Handler, ServerStreams: true, ClientStreams: true, }, }, Metadata: "management.proto", }