Add complete transit engine supporting symmetric encryption (AES-256-GCM, XChaCha20-Poly1305), asymmetric signing (Ed25519, ECDSA P-256/P-384), and HMAC (SHA-256/SHA-512) with versioned key rotation, min decryption version enforcement, key trimming, batch operations, and rewrap. Includes proto definitions, gRPC handlers, REST routes, and comprehensive tests covering all 18 operations, auth enforcement, and edge cases. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
778 lines
33 KiB
Go
778 lines
33 KiB
Go
// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
|
|
// versions:
|
|
// - protoc-gen-go-grpc v1.6.1
|
|
// - protoc v3.20.3
|
|
// source: proto/metacrypt/v2/transit.proto
|
|
|
|
package metacryptv2
|
|
|
|
import (
|
|
context "context"
|
|
grpc "google.golang.org/grpc"
|
|
codes "google.golang.org/grpc/codes"
|
|
status "google.golang.org/grpc/status"
|
|
)
|
|
|
|
// This is a compile-time assertion to ensure that this generated file
|
|
// is compatible with the grpc package it is being compiled against.
|
|
// Requires gRPC-Go v1.64.0 or later.
|
|
const _ = grpc.SupportPackageIsVersion9
|
|
|
|
const (
|
|
TransitService_CreateKey_FullMethodName = "/metacrypt.v2.TransitService/CreateKey"
|
|
TransitService_DeleteKey_FullMethodName = "/metacrypt.v2.TransitService/DeleteKey"
|
|
TransitService_GetKey_FullMethodName = "/metacrypt.v2.TransitService/GetKey"
|
|
TransitService_ListKeys_FullMethodName = "/metacrypt.v2.TransitService/ListKeys"
|
|
TransitService_RotateKey_FullMethodName = "/metacrypt.v2.TransitService/RotateKey"
|
|
TransitService_UpdateKeyConfig_FullMethodName = "/metacrypt.v2.TransitService/UpdateKeyConfig"
|
|
TransitService_TrimKey_FullMethodName = "/metacrypt.v2.TransitService/TrimKey"
|
|
TransitService_Encrypt_FullMethodName = "/metacrypt.v2.TransitService/Encrypt"
|
|
TransitService_Decrypt_FullMethodName = "/metacrypt.v2.TransitService/Decrypt"
|
|
TransitService_Rewrap_FullMethodName = "/metacrypt.v2.TransitService/Rewrap"
|
|
TransitService_BatchEncrypt_FullMethodName = "/metacrypt.v2.TransitService/BatchEncrypt"
|
|
TransitService_BatchDecrypt_FullMethodName = "/metacrypt.v2.TransitService/BatchDecrypt"
|
|
TransitService_BatchRewrap_FullMethodName = "/metacrypt.v2.TransitService/BatchRewrap"
|
|
TransitService_Sign_FullMethodName = "/metacrypt.v2.TransitService/Sign"
|
|
TransitService_Verify_FullMethodName = "/metacrypt.v2.TransitService/Verify"
|
|
TransitService_Hmac_FullMethodName = "/metacrypt.v2.TransitService/Hmac"
|
|
TransitService_GetPublicKey_FullMethodName = "/metacrypt.v2.TransitService/GetPublicKey"
|
|
)
|
|
|
|
// TransitServiceClient is the client API for TransitService service.
|
|
//
|
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
|
|
//
|
|
// TransitService provides typed, authenticated access to transit engine
|
|
// operations: symmetric encryption, signing, HMAC, and versioned key
|
|
// management. All RPCs require the service to be unsealed.
|
|
type TransitServiceClient interface {
|
|
// CreateKey creates a new named encryption key. Admin only.
|
|
CreateKey(ctx context.Context, in *CreateTransitKeyRequest, opts ...grpc.CallOption) (*CreateTransitKeyResponse, error)
|
|
// DeleteKey permanently removes a named key. Admin only.
|
|
// Only succeeds if allow_deletion is true on the key config.
|
|
DeleteKey(ctx context.Context, in *DeleteTransitKeyRequest, opts ...grpc.CallOption) (*DeleteTransitKeyResponse, error)
|
|
// GetKey returns metadata for a named key (no raw material). Auth required.
|
|
GetKey(ctx context.Context, in *GetTransitKeyRequest, opts ...grpc.CallOption) (*GetTransitKeyResponse, error)
|
|
// ListKeys returns the names of all configured keys. Auth required.
|
|
ListKeys(ctx context.Context, in *ListTransitKeysRequest, opts ...grpc.CallOption) (*ListTransitKeysResponse, error)
|
|
// RotateKey creates a new version of the named key. Admin only.
|
|
RotateKey(ctx context.Context, in *RotateTransitKeyRequest, opts ...grpc.CallOption) (*RotateTransitKeyResponse, error)
|
|
// UpdateKeyConfig updates key configuration (e.g. min_decryption_version).
|
|
// Admin only.
|
|
UpdateKeyConfig(ctx context.Context, in *UpdateTransitKeyConfigRequest, opts ...grpc.CallOption) (*UpdateTransitKeyConfigResponse, error)
|
|
// TrimKey deletes versions below min_decryption_version. Admin only.
|
|
TrimKey(ctx context.Context, in *TrimTransitKeyRequest, opts ...grpc.CallOption) (*TrimTransitKeyResponse, error)
|
|
// Encrypt encrypts plaintext with the latest key version. Auth required.
|
|
Encrypt(ctx context.Context, in *TransitEncryptRequest, opts ...grpc.CallOption) (*TransitEncryptResponse, error)
|
|
// Decrypt decrypts ciphertext. Auth required.
|
|
Decrypt(ctx context.Context, in *TransitDecryptRequest, opts ...grpc.CallOption) (*TransitDecryptResponse, error)
|
|
// Rewrap re-encrypts ciphertext with the latest key version without
|
|
// exposing plaintext. Auth required.
|
|
Rewrap(ctx context.Context, in *TransitRewrapRequest, opts ...grpc.CallOption) (*TransitRewrapResponse, error)
|
|
// BatchEncrypt encrypts multiple items in a single request. Auth required.
|
|
BatchEncrypt(ctx context.Context, in *TransitBatchEncryptRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error)
|
|
// BatchDecrypt decrypts multiple items in a single request. Auth required.
|
|
BatchDecrypt(ctx context.Context, in *TransitBatchDecryptRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error)
|
|
// BatchRewrap re-encrypts multiple items in a single request. Auth required.
|
|
BatchRewrap(ctx context.Context, in *TransitBatchRewrapRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error)
|
|
// Sign signs input data with an asymmetric key. Auth required.
|
|
Sign(ctx context.Context, in *TransitSignRequest, opts ...grpc.CallOption) (*TransitSignResponse, error)
|
|
// Verify verifies a signature against input data. Auth required.
|
|
Verify(ctx context.Context, in *TransitVerifyRequest, opts ...grpc.CallOption) (*TransitVerifyResponse, error)
|
|
// Hmac computes or verifies an HMAC. Auth required.
|
|
Hmac(ctx context.Context, in *TransitHmacRequest, opts ...grpc.CallOption) (*TransitHmacResponse, error)
|
|
// GetPublicKey returns the public key for an asymmetric key. Auth required.
|
|
GetPublicKey(ctx context.Context, in *GetTransitPublicKeyRequest, opts ...grpc.CallOption) (*GetTransitPublicKeyResponse, error)
|
|
}
|
|
|
|
type transitServiceClient struct {
|
|
cc grpc.ClientConnInterface
|
|
}
|
|
|
|
func NewTransitServiceClient(cc grpc.ClientConnInterface) TransitServiceClient {
|
|
return &transitServiceClient{cc}
|
|
}
|
|
|
|
func (c *transitServiceClient) CreateKey(ctx context.Context, in *CreateTransitKeyRequest, opts ...grpc.CallOption) (*CreateTransitKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(CreateTransitKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_CreateKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) DeleteKey(ctx context.Context, in *DeleteTransitKeyRequest, opts ...grpc.CallOption) (*DeleteTransitKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(DeleteTransitKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_DeleteKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) GetKey(ctx context.Context, in *GetTransitKeyRequest, opts ...grpc.CallOption) (*GetTransitKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(GetTransitKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_GetKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) ListKeys(ctx context.Context, in *ListTransitKeysRequest, opts ...grpc.CallOption) (*ListTransitKeysResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(ListTransitKeysResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_ListKeys_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) RotateKey(ctx context.Context, in *RotateTransitKeyRequest, opts ...grpc.CallOption) (*RotateTransitKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(RotateTransitKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_RotateKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) UpdateKeyConfig(ctx context.Context, in *UpdateTransitKeyConfigRequest, opts ...grpc.CallOption) (*UpdateTransitKeyConfigResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(UpdateTransitKeyConfigResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_UpdateKeyConfig_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) TrimKey(ctx context.Context, in *TrimTransitKeyRequest, opts ...grpc.CallOption) (*TrimTransitKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TrimTransitKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_TrimKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Encrypt(ctx context.Context, in *TransitEncryptRequest, opts ...grpc.CallOption) (*TransitEncryptResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitEncryptResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Encrypt_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Decrypt(ctx context.Context, in *TransitDecryptRequest, opts ...grpc.CallOption) (*TransitDecryptResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitDecryptResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Decrypt_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Rewrap(ctx context.Context, in *TransitRewrapRequest, opts ...grpc.CallOption) (*TransitRewrapResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitRewrapResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Rewrap_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) BatchEncrypt(ctx context.Context, in *TransitBatchEncryptRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitBatchResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_BatchEncrypt_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) BatchDecrypt(ctx context.Context, in *TransitBatchDecryptRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitBatchResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_BatchDecrypt_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) BatchRewrap(ctx context.Context, in *TransitBatchRewrapRequest, opts ...grpc.CallOption) (*TransitBatchResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitBatchResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_BatchRewrap_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Sign(ctx context.Context, in *TransitSignRequest, opts ...grpc.CallOption) (*TransitSignResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitSignResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Sign_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Verify(ctx context.Context, in *TransitVerifyRequest, opts ...grpc.CallOption) (*TransitVerifyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitVerifyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Verify_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) Hmac(ctx context.Context, in *TransitHmacRequest, opts ...grpc.CallOption) (*TransitHmacResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(TransitHmacResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_Hmac_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func (c *transitServiceClient) GetPublicKey(ctx context.Context, in *GetTransitPublicKeyRequest, opts ...grpc.CallOption) (*GetTransitPublicKeyResponse, error) {
|
|
cOpts := append([]grpc.CallOption{grpc.StaticMethod()}, opts...)
|
|
out := new(GetTransitPublicKeyResponse)
|
|
err := c.cc.Invoke(ctx, TransitService_GetPublicKey_FullMethodName, in, out, cOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
// TransitServiceServer is the server API for TransitService service.
|
|
// All implementations must embed UnimplementedTransitServiceServer
|
|
// for forward compatibility.
|
|
//
|
|
// TransitService provides typed, authenticated access to transit engine
|
|
// operations: symmetric encryption, signing, HMAC, and versioned key
|
|
// management. All RPCs require the service to be unsealed.
|
|
type TransitServiceServer interface {
|
|
// CreateKey creates a new named encryption key. Admin only.
|
|
CreateKey(context.Context, *CreateTransitKeyRequest) (*CreateTransitKeyResponse, error)
|
|
// DeleteKey permanently removes a named key. Admin only.
|
|
// Only succeeds if allow_deletion is true on the key config.
|
|
DeleteKey(context.Context, *DeleteTransitKeyRequest) (*DeleteTransitKeyResponse, error)
|
|
// GetKey returns metadata for a named key (no raw material). Auth required.
|
|
GetKey(context.Context, *GetTransitKeyRequest) (*GetTransitKeyResponse, error)
|
|
// ListKeys returns the names of all configured keys. Auth required.
|
|
ListKeys(context.Context, *ListTransitKeysRequest) (*ListTransitKeysResponse, error)
|
|
// RotateKey creates a new version of the named key. Admin only.
|
|
RotateKey(context.Context, *RotateTransitKeyRequest) (*RotateTransitKeyResponse, error)
|
|
// UpdateKeyConfig updates key configuration (e.g. min_decryption_version).
|
|
// Admin only.
|
|
UpdateKeyConfig(context.Context, *UpdateTransitKeyConfigRequest) (*UpdateTransitKeyConfigResponse, error)
|
|
// TrimKey deletes versions below min_decryption_version. Admin only.
|
|
TrimKey(context.Context, *TrimTransitKeyRequest) (*TrimTransitKeyResponse, error)
|
|
// Encrypt encrypts plaintext with the latest key version. Auth required.
|
|
Encrypt(context.Context, *TransitEncryptRequest) (*TransitEncryptResponse, error)
|
|
// Decrypt decrypts ciphertext. Auth required.
|
|
Decrypt(context.Context, *TransitDecryptRequest) (*TransitDecryptResponse, error)
|
|
// Rewrap re-encrypts ciphertext with the latest key version without
|
|
// exposing plaintext. Auth required.
|
|
Rewrap(context.Context, *TransitRewrapRequest) (*TransitRewrapResponse, error)
|
|
// BatchEncrypt encrypts multiple items in a single request. Auth required.
|
|
BatchEncrypt(context.Context, *TransitBatchEncryptRequest) (*TransitBatchResponse, error)
|
|
// BatchDecrypt decrypts multiple items in a single request. Auth required.
|
|
BatchDecrypt(context.Context, *TransitBatchDecryptRequest) (*TransitBatchResponse, error)
|
|
// BatchRewrap re-encrypts multiple items in a single request. Auth required.
|
|
BatchRewrap(context.Context, *TransitBatchRewrapRequest) (*TransitBatchResponse, error)
|
|
// Sign signs input data with an asymmetric key. Auth required.
|
|
Sign(context.Context, *TransitSignRequest) (*TransitSignResponse, error)
|
|
// Verify verifies a signature against input data. Auth required.
|
|
Verify(context.Context, *TransitVerifyRequest) (*TransitVerifyResponse, error)
|
|
// Hmac computes or verifies an HMAC. Auth required.
|
|
Hmac(context.Context, *TransitHmacRequest) (*TransitHmacResponse, error)
|
|
// GetPublicKey returns the public key for an asymmetric key. Auth required.
|
|
GetPublicKey(context.Context, *GetTransitPublicKeyRequest) (*GetTransitPublicKeyResponse, error)
|
|
mustEmbedUnimplementedTransitServiceServer()
|
|
}
|
|
|
|
// UnimplementedTransitServiceServer must be embedded to have
|
|
// forward compatible implementations.
|
|
//
|
|
// NOTE: this should be embedded by value instead of pointer to avoid a nil
|
|
// pointer dereference when methods are called.
|
|
type UnimplementedTransitServiceServer struct{}
|
|
|
|
func (UnimplementedTransitServiceServer) CreateKey(context.Context, *CreateTransitKeyRequest) (*CreateTransitKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method CreateKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) DeleteKey(context.Context, *DeleteTransitKeyRequest) (*DeleteTransitKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method DeleteKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) GetKey(context.Context, *GetTransitKeyRequest) (*GetTransitKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method GetKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) ListKeys(context.Context, *ListTransitKeysRequest) (*ListTransitKeysResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method ListKeys not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) RotateKey(context.Context, *RotateTransitKeyRequest) (*RotateTransitKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method RotateKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) UpdateKeyConfig(context.Context, *UpdateTransitKeyConfigRequest) (*UpdateTransitKeyConfigResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method UpdateKeyConfig not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) TrimKey(context.Context, *TrimTransitKeyRequest) (*TrimTransitKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method TrimKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Encrypt(context.Context, *TransitEncryptRequest) (*TransitEncryptResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Encrypt not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Decrypt(context.Context, *TransitDecryptRequest) (*TransitDecryptResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Decrypt not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Rewrap(context.Context, *TransitRewrapRequest) (*TransitRewrapResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Rewrap not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) BatchEncrypt(context.Context, *TransitBatchEncryptRequest) (*TransitBatchResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method BatchEncrypt not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) BatchDecrypt(context.Context, *TransitBatchDecryptRequest) (*TransitBatchResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method BatchDecrypt not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) BatchRewrap(context.Context, *TransitBatchRewrapRequest) (*TransitBatchResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method BatchRewrap not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Sign(context.Context, *TransitSignRequest) (*TransitSignResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Sign not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Verify(context.Context, *TransitVerifyRequest) (*TransitVerifyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Verify not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) Hmac(context.Context, *TransitHmacRequest) (*TransitHmacResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method Hmac not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) GetPublicKey(context.Context, *GetTransitPublicKeyRequest) (*GetTransitPublicKeyResponse, error) {
|
|
return nil, status.Error(codes.Unimplemented, "method GetPublicKey not implemented")
|
|
}
|
|
func (UnimplementedTransitServiceServer) mustEmbedUnimplementedTransitServiceServer() {}
|
|
func (UnimplementedTransitServiceServer) testEmbeddedByValue() {}
|
|
|
|
// UnsafeTransitServiceServer may be embedded to opt out of forward compatibility for this service.
|
|
// Use of this interface is not recommended, as added methods to TransitServiceServer will
|
|
// result in compilation errors.
|
|
type UnsafeTransitServiceServer interface {
|
|
mustEmbedUnimplementedTransitServiceServer()
|
|
}
|
|
|
|
func RegisterTransitServiceServer(s grpc.ServiceRegistrar, srv TransitServiceServer) {
|
|
// If the following call panics, it indicates UnimplementedTransitServiceServer was
|
|
// embedded by pointer and is nil. This will cause panics if an
|
|
// unimplemented method is ever invoked, so we test this at initialization
|
|
// time to prevent it from happening at runtime later due to I/O.
|
|
if t, ok := srv.(interface{ testEmbeddedByValue() }); ok {
|
|
t.testEmbeddedByValue()
|
|
}
|
|
s.RegisterService(&TransitService_ServiceDesc, srv)
|
|
}
|
|
|
|
func _TransitService_CreateKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(CreateTransitKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).CreateKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_CreateKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).CreateKey(ctx, req.(*CreateTransitKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_DeleteKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(DeleteTransitKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).DeleteKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_DeleteKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).DeleteKey(ctx, req.(*DeleteTransitKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_GetKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(GetTransitKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).GetKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_GetKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).GetKey(ctx, req.(*GetTransitKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_ListKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(ListTransitKeysRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).ListKeys(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_ListKeys_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).ListKeys(ctx, req.(*ListTransitKeysRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_RotateKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(RotateTransitKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).RotateKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_RotateKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).RotateKey(ctx, req.(*RotateTransitKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_UpdateKeyConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(UpdateTransitKeyConfigRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).UpdateKeyConfig(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_UpdateKeyConfig_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).UpdateKeyConfig(ctx, req.(*UpdateTransitKeyConfigRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_TrimKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TrimTransitKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).TrimKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_TrimKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).TrimKey(ctx, req.(*TrimTransitKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitEncryptRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Encrypt(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Encrypt_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Encrypt(ctx, req.(*TransitEncryptRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitDecryptRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Decrypt(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Decrypt_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Decrypt(ctx, req.(*TransitDecryptRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Rewrap_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitRewrapRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Rewrap(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Rewrap_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Rewrap(ctx, req.(*TransitRewrapRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_BatchEncrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitBatchEncryptRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).BatchEncrypt(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_BatchEncrypt_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).BatchEncrypt(ctx, req.(*TransitBatchEncryptRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_BatchDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitBatchDecryptRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).BatchDecrypt(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_BatchDecrypt_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).BatchDecrypt(ctx, req.(*TransitBatchDecryptRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_BatchRewrap_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitBatchRewrapRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).BatchRewrap(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_BatchRewrap_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).BatchRewrap(ctx, req.(*TransitBatchRewrapRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Sign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitSignRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Sign(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Sign_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Sign(ctx, req.(*TransitSignRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Verify_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitVerifyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Verify(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Verify_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Verify(ctx, req.(*TransitVerifyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_Hmac_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(TransitHmacRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).Hmac(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_Hmac_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).Hmac(ctx, req.(*TransitHmacRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
func _TransitService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
in := new(GetTransitPublicKeyRequest)
|
|
if err := dec(in); err != nil {
|
|
return nil, err
|
|
}
|
|
if interceptor == nil {
|
|
return srv.(TransitServiceServer).GetPublicKey(ctx, in)
|
|
}
|
|
info := &grpc.UnaryServerInfo{
|
|
Server: srv,
|
|
FullMethod: TransitService_GetPublicKey_FullMethodName,
|
|
}
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
return srv.(TransitServiceServer).GetPublicKey(ctx, req.(*GetTransitPublicKeyRequest))
|
|
}
|
|
return interceptor(ctx, in, info, handler)
|
|
}
|
|
|
|
// TransitService_ServiceDesc is the grpc.ServiceDesc for TransitService service.
|
|
// It's only intended for direct use with grpc.RegisterService,
|
|
// and not to be introspected or modified (even as a copy)
|
|
var TransitService_ServiceDesc = grpc.ServiceDesc{
|
|
ServiceName: "metacrypt.v2.TransitService",
|
|
HandlerType: (*TransitServiceServer)(nil),
|
|
Methods: []grpc.MethodDesc{
|
|
{
|
|
MethodName: "CreateKey",
|
|
Handler: _TransitService_CreateKey_Handler,
|
|
},
|
|
{
|
|
MethodName: "DeleteKey",
|
|
Handler: _TransitService_DeleteKey_Handler,
|
|
},
|
|
{
|
|
MethodName: "GetKey",
|
|
Handler: _TransitService_GetKey_Handler,
|
|
},
|
|
{
|
|
MethodName: "ListKeys",
|
|
Handler: _TransitService_ListKeys_Handler,
|
|
},
|
|
{
|
|
MethodName: "RotateKey",
|
|
Handler: _TransitService_RotateKey_Handler,
|
|
},
|
|
{
|
|
MethodName: "UpdateKeyConfig",
|
|
Handler: _TransitService_UpdateKeyConfig_Handler,
|
|
},
|
|
{
|
|
MethodName: "TrimKey",
|
|
Handler: _TransitService_TrimKey_Handler,
|
|
},
|
|
{
|
|
MethodName: "Encrypt",
|
|
Handler: _TransitService_Encrypt_Handler,
|
|
},
|
|
{
|
|
MethodName: "Decrypt",
|
|
Handler: _TransitService_Decrypt_Handler,
|
|
},
|
|
{
|
|
MethodName: "Rewrap",
|
|
Handler: _TransitService_Rewrap_Handler,
|
|
},
|
|
{
|
|
MethodName: "BatchEncrypt",
|
|
Handler: _TransitService_BatchEncrypt_Handler,
|
|
},
|
|
{
|
|
MethodName: "BatchDecrypt",
|
|
Handler: _TransitService_BatchDecrypt_Handler,
|
|
},
|
|
{
|
|
MethodName: "BatchRewrap",
|
|
Handler: _TransitService_BatchRewrap_Handler,
|
|
},
|
|
{
|
|
MethodName: "Sign",
|
|
Handler: _TransitService_Sign_Handler,
|
|
},
|
|
{
|
|
MethodName: "Verify",
|
|
Handler: _TransitService_Verify_Handler,
|
|
},
|
|
{
|
|
MethodName: "Hmac",
|
|
Handler: _TransitService_Hmac_Handler,
|
|
},
|
|
{
|
|
MethodName: "GetPublicKey",
|
|
Handler: _TransitService_GetPublicKey_Handler,
|
|
},
|
|
},
|
|
Streams: []grpc.StreamDesc{},
|
|
Metadata: "proto/metacrypt/v2/transit.proto",
|
|
}
|