@lazycatcloud/sdk 0.1.144 → 0.1.146

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/dist/common/media_meta.js +2 -2
  2. package/dist/common/media_meta.js.map +1 -1
  3. package/dist/extentions/app_common.d.ts.map +1 -1
  4. package/dist/extentions/app_common.js +43 -18
  5. package/dist/extentions/app_common.js.map +1 -1
  6. package/dist/extentions/base.d.ts +2 -2
  7. package/dist/extentions/base.d.ts.map +1 -1
  8. package/dist/extentions/base.js +3 -3
  9. package/dist/extentions/base.js.map +1 -1
  10. package/dist/package.json +10 -2
  11. package/package.json +10 -2
  12. package/common/box.ts +0 -545
  13. package/common/browseronly.ts +0 -520
  14. package/common/end_device.ts +0 -635
  15. package/common/file_handler.ts +0 -485
  16. package/common/filetrans.ts +0 -1936
  17. package/common/gateway.ts +0 -663
  18. package/common/media_meta.ts +0 -319
  19. package/common/message.ts +0 -242
  20. package/common/peripheral_device.ts +0 -783
  21. package/common/security_context.ts +0 -729
  22. package/common/users.ts +0 -1044
  23. package/dlna/dlna.ts +0 -895
  24. package/docs/contribute.md +0 -40
  25. package/docs/extentions/AppCommon.md +0 -30
  26. package/extentions/app_common.ts +0 -63
  27. package/extentions/base.ts +0 -459
  28. package/extentions/index.ts +0 -27
  29. package/extentions/safe_app.ts +0 -60
  30. package/extentions/unsafe_app.ts +0 -107
  31. package/google/protobuf/descriptor.ts +0 -3778
  32. package/google/protobuf/empty.ts +0 -64
  33. package/google/protobuf/timestamp.ts +0 -214
  34. package/grpcweb.ts +0 -106
  35. package/index.ts +0 -204
  36. package/lanforward/lanforward.ts +0 -301
  37. package/localdevice/clipboard.ts +0 -499
  38. package/localdevice/config.ts +0 -268
  39. package/localdevice/device.ts +0 -218
  40. package/localdevice/dialog.ts +0 -707
  41. package/localdevice/local-launch.ts +0 -954
  42. package/localdevice/network.ts +0 -273
  43. package/localdevice/permission.ts +0 -733
  44. package/localdevice/photo.ts +0 -1497
  45. package/ssdp/ssdp.ts +0 -332
  46. package/sys/OS_daemon.ts +0 -325
  47. package/sys/OS_snapshot.ts +0 -1714
  48. package/sys/OS_upgrader.ts +0 -782
  49. package/sys/btrfs.ts +0 -530
  50. package/sys/devopt.ts +0 -250
  51. package/sys/event.ts +0 -787
  52. package/sys/hc-core/hc-core.ts +0 -1582
  53. package/sys/ingress.ts +0 -953
  54. package/sys/network_manager.ts +0 -874
  55. package/sys/package_manager.ts +0 -1931
  56. package/sys/portal-server/portal-server.ts +0 -2934
  57. package/sys/snapd.ts +0 -861
  58. package/tsconfig.json +0 -15
@@ -1,729 +0,0 @@
1
- /* eslint-disable */
2
- import { grpc } from "@improbable-eng/grpc-web";
3
- import { BrowserHeaders } from "browser-headers";
4
- import _m0 from "protobufjs/minimal";
5
-
6
- export enum Permission {
7
- /** USER_DOCUMENT - 是否允许挂载用户文档数据 */
8
- USER_DOCUMENT = 0,
9
- /** INSTALL_PACKAGE - 是否允许安装软件 */
10
- INSTALL_PACKAGE = 1,
11
- /** ACCESS_REMOVEABLE_STOREAGE - 是否允许挂载可移动存储设备 */
12
- ACCESS_REMOVEABLE_STOREAGE = 2,
13
- /** ACCESS_ENDDEVICE - 是否允许生成访问EndDevice的访问凭证, EndDevice会进行具体API的权限验证 */
14
- ACCESS_ENDDEVICE = 1000,
15
- ENDDEVICE_CLIPBOARD = 1001,
16
- ENDDEVICE_NETWORK_INFO = 1002,
17
- ENDDEVICE_PHOTOLIBRARY = 1003,
18
- UNRECOGNIZED = -1,
19
- }
20
-
21
- export function permissionFromJSON(object: any): Permission {
22
- switch (object) {
23
- case 0:
24
- case "USER_DOCUMENT":
25
- return Permission.USER_DOCUMENT;
26
- case 1:
27
- case "INSTALL_PACKAGE":
28
- return Permission.INSTALL_PACKAGE;
29
- case 2:
30
- case "ACCESS_REMOVEABLE_STOREAGE":
31
- return Permission.ACCESS_REMOVEABLE_STOREAGE;
32
- case 1000:
33
- case "ACCESS_ENDDEVICE":
34
- return Permission.ACCESS_ENDDEVICE;
35
- case 1001:
36
- case "ENDDEVICE_CLIPBOARD":
37
- return Permission.ENDDEVICE_CLIPBOARD;
38
- case 1002:
39
- case "ENDDEVICE_NETWORK_INFO":
40
- return Permission.ENDDEVICE_NETWORK_INFO;
41
- case 1003:
42
- case "ENDDEVICE_PHOTOLIBRARY":
43
- return Permission.ENDDEVICE_PHOTOLIBRARY;
44
- case -1:
45
- case "UNRECOGNIZED":
46
- default:
47
- return Permission.UNRECOGNIZED;
48
- }
49
- }
50
-
51
- export function permissionToJSON(object: Permission): string {
52
- switch (object) {
53
- case Permission.USER_DOCUMENT:
54
- return "USER_DOCUMENT";
55
- case Permission.INSTALL_PACKAGE:
56
- return "INSTALL_PACKAGE";
57
- case Permission.ACCESS_REMOVEABLE_STOREAGE:
58
- return "ACCESS_REMOVEABLE_STOREAGE";
59
- case Permission.ACCESS_ENDDEVICE:
60
- return "ACCESS_ENDDEVICE";
61
- case Permission.ENDDEVICE_CLIPBOARD:
62
- return "ENDDEVICE_CLIPBOARD";
63
- case Permission.ENDDEVICE_NETWORK_INFO:
64
- return "ENDDEVICE_NETWORK_INFO";
65
- case Permission.ENDDEVICE_PHOTOLIBRARY:
66
- return "ENDDEVICE_PHOTOLIBRARY";
67
- case Permission.UNRECOGNIZED:
68
- default:
69
- return "UNRECOGNIZED";
70
- }
71
- }
72
-
73
- export enum UserClass {
74
- /** ANY_USER - 可以没有用户(比如一个纯后端app)或任何有效用户 */
75
- ANY_USER = 0,
76
- /** NORMAL_USER - 任何有效的用户 */
77
- NORMAL_USER = 1,
78
- /** ADMIN_USER - 必须是管理员用户 */
79
- ADMIN_USER = 2,
80
- /**
81
- * TARGET_USER - 请求者必须是资源所有者对应的用户,比如"设置密码"每个用户都有权设置,但仅能设置自身的
82
- * 具体的TARGET_USER通过input message中的target_uid_field option进行标记
83
- */
84
- TARGET_USER = 3,
85
- UNRECOGNIZED = -1,
86
- }
87
-
88
- export function userClassFromJSON(object: any): UserClass {
89
- switch (object) {
90
- case 0:
91
- case "ANY_USER":
92
- return UserClass.ANY_USER;
93
- case 1:
94
- case "NORMAL_USER":
95
- return UserClass.NORMAL_USER;
96
- case 2:
97
- case "ADMIN_USER":
98
- return UserClass.ADMIN_USER;
99
- case 3:
100
- case "TARGET_USER":
101
- return UserClass.TARGET_USER;
102
- case -1:
103
- case "UNRECOGNIZED":
104
- default:
105
- return UserClass.UNRECOGNIZED;
106
- }
107
- }
108
-
109
- export function userClassToJSON(object: UserClass): string {
110
- switch (object) {
111
- case UserClass.ANY_USER:
112
- return "ANY_USER";
113
- case UserClass.NORMAL_USER:
114
- return "NORMAL_USER";
115
- case UserClass.ADMIN_USER:
116
- return "ADMIN_USER";
117
- case UserClass.TARGET_USER:
118
- return "TARGET_USER";
119
- case UserClass.UNRECOGNIZED:
120
- default:
121
- return "UNRECOGNIZED";
122
- }
123
- }
124
-
125
- export enum SecurityContextMetaKey {
126
- META_KEY_X_LZCAPI_APPID = 0,
127
- META_KEY_X_LZCAPI_REALUID = 1,
128
- META_KEY_X_LZCAPI_UID = 2,
129
- UNRECOGNIZED = -1,
130
- }
131
-
132
- export function securityContextMetaKeyFromJSON(object: any): SecurityContextMetaKey {
133
- switch (object) {
134
- case 0:
135
- case "META_KEY_X_LZCAPI_APPID":
136
- return SecurityContextMetaKey.META_KEY_X_LZCAPI_APPID;
137
- case 1:
138
- case "META_KEY_X_LZCAPI_REALUID":
139
- return SecurityContextMetaKey.META_KEY_X_LZCAPI_REALUID;
140
- case 2:
141
- case "META_KEY_X_LZCAPI_UID":
142
- return SecurityContextMetaKey.META_KEY_X_LZCAPI_UID;
143
- case -1:
144
- case "UNRECOGNIZED":
145
- default:
146
- return SecurityContextMetaKey.UNRECOGNIZED;
147
- }
148
- }
149
-
150
- export function securityContextMetaKeyToJSON(object: SecurityContextMetaKey): string {
151
- switch (object) {
152
- case SecurityContextMetaKey.META_KEY_X_LZCAPI_APPID:
153
- return "META_KEY_X_LZCAPI_APPID";
154
- case SecurityContextMetaKey.META_KEY_X_LZCAPI_REALUID:
155
- return "META_KEY_X_LZCAPI_REALUID";
156
- case SecurityContextMetaKey.META_KEY_X_LZCAPI_UID:
157
- return "META_KEY_X_LZCAPI_UID";
158
- case SecurityContextMetaKey.UNRECOGNIZED:
159
- default:
160
- return "UNRECOGNIZED";
161
- }
162
- }
163
-
164
- /** APIGateway在进行完权限检测放行后,转发给API Services时会通过metadata附带以下信息 */
165
- export interface SecurityContext {
166
- /** 请求来源的真实appid,一定是合法有效的 */
167
- appid: string;
168
- /** 请求来源的真实uid,一定是合法有效的 */
169
- realUid: string;
170
- /**
171
- * 请求来源期望的uid,注意此值可以被app server篡改
172
- * 若uid != real_uid且对应SecurityContextRequire.disable_behalf_of_uid == true
173
- * 则此请求会被APIGATEWAY阻止转发
174
- * 若app server没有篡改此值,则此值与real_uid相同
175
- */
176
- uid: string;
177
- }
178
-
179
- /**
180
- * 以下权限要求通过option的方式声明在proto文件内
181
- * 并由APIGateway进行验证
182
- */
183
- export interface SecurityContextRequire {
184
- requirePermissions: Permission[];
185
- requireUserClass: UserClass;
186
- /** 请求必须直接通过app server发起,而非serverless端发起 */
187
- requireFromBackend: boolean;
188
- /** 禁止app server伪造uid */
189
- disableBehalfOfUid: boolean;
190
- }
191
-
192
- export interface PermissionDesc {
193
- /** 申请权限的原因说明 */
194
- reason: string;
195
- /** 权限列表 */
196
- permissions: Permission[];
197
- }
198
-
199
- /** 后续调用lzc-apis时,需要带上此token */
200
- export interface PermissionToken {
201
- token: string;
202
- }
203
-
204
- export interface PermissionStatus {
205
- }
206
-
207
- export interface HasPermissionRequest {
208
- perm: Permission;
209
- }
210
-
211
- function createBaseSecurityContext(): SecurityContext {
212
- return { appid: "", realUid: "", uid: "" };
213
- }
214
-
215
- export const SecurityContext = {
216
- encode(message: SecurityContext, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
217
- if (message.appid !== "") {
218
- writer.uint32(10).string(message.appid);
219
- }
220
- if (message.realUid !== "") {
221
- writer.uint32(18).string(message.realUid);
222
- }
223
- if (message.uid !== "") {
224
- writer.uint32(26).string(message.uid);
225
- }
226
- return writer;
227
- },
228
-
229
- decode(input: _m0.Reader | Uint8Array, length?: number): SecurityContext {
230
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
231
- let end = length === undefined ? reader.len : reader.pos + length;
232
- const message = createBaseSecurityContext();
233
- while (reader.pos < end) {
234
- const tag = reader.uint32();
235
- switch (tag >>> 3) {
236
- case 1:
237
- message.appid = reader.string();
238
- break;
239
- case 2:
240
- message.realUid = reader.string();
241
- break;
242
- case 3:
243
- message.uid = reader.string();
244
- break;
245
- default:
246
- reader.skipType(tag & 7);
247
- break;
248
- }
249
- }
250
- return message;
251
- },
252
-
253
- fromJSON(object: any): SecurityContext {
254
- return {
255
- appid: isSet(object.appid) ? String(object.appid) : "",
256
- realUid: isSet(object.realUid) ? String(object.realUid) : "",
257
- uid: isSet(object.uid) ? String(object.uid) : "",
258
- };
259
- },
260
-
261
- toJSON(message: SecurityContext): unknown {
262
- const obj: any = {};
263
- message.appid !== undefined && (obj.appid = message.appid);
264
- message.realUid !== undefined && (obj.realUid = message.realUid);
265
- message.uid !== undefined && (obj.uid = message.uid);
266
- return obj;
267
- },
268
-
269
- fromPartial<I extends Exact<DeepPartial<SecurityContext>, I>>(object: I): SecurityContext {
270
- const message = createBaseSecurityContext();
271
- message.appid = object.appid ?? "";
272
- message.realUid = object.realUid ?? "";
273
- message.uid = object.uid ?? "";
274
- return message;
275
- },
276
- };
277
-
278
- function createBaseSecurityContextRequire(): SecurityContextRequire {
279
- return { requirePermissions: [], requireUserClass: 0, requireFromBackend: false, disableBehalfOfUid: false };
280
- }
281
-
282
- export const SecurityContextRequire = {
283
- encode(message: SecurityContextRequire, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
284
- writer.uint32(10).fork();
285
- for (const v of message.requirePermissions) {
286
- writer.int32(v);
287
- }
288
- writer.ldelim();
289
- if (message.requireUserClass !== 0) {
290
- writer.uint32(16).int32(message.requireUserClass);
291
- }
292
- if (message.requireFromBackend === true) {
293
- writer.uint32(24).bool(message.requireFromBackend);
294
- }
295
- if (message.disableBehalfOfUid === true) {
296
- writer.uint32(32).bool(message.disableBehalfOfUid);
297
- }
298
- return writer;
299
- },
300
-
301
- decode(input: _m0.Reader | Uint8Array, length?: number): SecurityContextRequire {
302
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
303
- let end = length === undefined ? reader.len : reader.pos + length;
304
- const message = createBaseSecurityContextRequire();
305
- while (reader.pos < end) {
306
- const tag = reader.uint32();
307
- switch (tag >>> 3) {
308
- case 1:
309
- if ((tag & 7) === 2) {
310
- const end2 = reader.uint32() + reader.pos;
311
- while (reader.pos < end2) {
312
- message.requirePermissions.push(reader.int32() as any);
313
- }
314
- } else {
315
- message.requirePermissions.push(reader.int32() as any);
316
- }
317
- break;
318
- case 2:
319
- message.requireUserClass = reader.int32() as any;
320
- break;
321
- case 3:
322
- message.requireFromBackend = reader.bool();
323
- break;
324
- case 4:
325
- message.disableBehalfOfUid = reader.bool();
326
- break;
327
- default:
328
- reader.skipType(tag & 7);
329
- break;
330
- }
331
- }
332
- return message;
333
- },
334
-
335
- fromJSON(object: any): SecurityContextRequire {
336
- return {
337
- requirePermissions: Array.isArray(object?.requirePermissions)
338
- ? object.requirePermissions.map((e: any) => permissionFromJSON(e))
339
- : [],
340
- requireUserClass: isSet(object.requireUserClass) ? userClassFromJSON(object.requireUserClass) : 0,
341
- requireFromBackend: isSet(object.requireFromBackend) ? Boolean(object.requireFromBackend) : false,
342
- disableBehalfOfUid: isSet(object.disableBehalfOfUid) ? Boolean(object.disableBehalfOfUid) : false,
343
- };
344
- },
345
-
346
- toJSON(message: SecurityContextRequire): unknown {
347
- const obj: any = {};
348
- if (message.requirePermissions) {
349
- obj.requirePermissions = message.requirePermissions.map((e) => permissionToJSON(e));
350
- } else {
351
- obj.requirePermissions = [];
352
- }
353
- message.requireUserClass !== undefined && (obj.requireUserClass = userClassToJSON(message.requireUserClass));
354
- message.requireFromBackend !== undefined && (obj.requireFromBackend = message.requireFromBackend);
355
- message.disableBehalfOfUid !== undefined && (obj.disableBehalfOfUid = message.disableBehalfOfUid);
356
- return obj;
357
- },
358
-
359
- fromPartial<I extends Exact<DeepPartial<SecurityContextRequire>, I>>(object: I): SecurityContextRequire {
360
- const message = createBaseSecurityContextRequire();
361
- message.requirePermissions = object.requirePermissions?.map((e) => e) || [];
362
- message.requireUserClass = object.requireUserClass ?? 0;
363
- message.requireFromBackend = object.requireFromBackend ?? false;
364
- message.disableBehalfOfUid = object.disableBehalfOfUid ?? false;
365
- return message;
366
- },
367
- };
368
-
369
- function createBasePermissionDesc(): PermissionDesc {
370
- return { reason: "", permissions: [] };
371
- }
372
-
373
- export const PermissionDesc = {
374
- encode(message: PermissionDesc, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
375
- if (message.reason !== "") {
376
- writer.uint32(10).string(message.reason);
377
- }
378
- writer.uint32(18).fork();
379
- for (const v of message.permissions) {
380
- writer.int32(v);
381
- }
382
- writer.ldelim();
383
- return writer;
384
- },
385
-
386
- decode(input: _m0.Reader | Uint8Array, length?: number): PermissionDesc {
387
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
388
- let end = length === undefined ? reader.len : reader.pos + length;
389
- const message = createBasePermissionDesc();
390
- while (reader.pos < end) {
391
- const tag = reader.uint32();
392
- switch (tag >>> 3) {
393
- case 1:
394
- message.reason = reader.string();
395
- break;
396
- case 2:
397
- if ((tag & 7) === 2) {
398
- const end2 = reader.uint32() + reader.pos;
399
- while (reader.pos < end2) {
400
- message.permissions.push(reader.int32() as any);
401
- }
402
- } else {
403
- message.permissions.push(reader.int32() as any);
404
- }
405
- break;
406
- default:
407
- reader.skipType(tag & 7);
408
- break;
409
- }
410
- }
411
- return message;
412
- },
413
-
414
- fromJSON(object: any): PermissionDesc {
415
- return {
416
- reason: isSet(object.reason) ? String(object.reason) : "",
417
- permissions: Array.isArray(object?.permissions) ? object.permissions.map((e: any) => permissionFromJSON(e)) : [],
418
- };
419
- },
420
-
421
- toJSON(message: PermissionDesc): unknown {
422
- const obj: any = {};
423
- message.reason !== undefined && (obj.reason = message.reason);
424
- if (message.permissions) {
425
- obj.permissions = message.permissions.map((e) => permissionToJSON(e));
426
- } else {
427
- obj.permissions = [];
428
- }
429
- return obj;
430
- },
431
-
432
- fromPartial<I extends Exact<DeepPartial<PermissionDesc>, I>>(object: I): PermissionDesc {
433
- const message = createBasePermissionDesc();
434
- message.reason = object.reason ?? "";
435
- message.permissions = object.permissions?.map((e) => e) || [];
436
- return message;
437
- },
438
- };
439
-
440
- function createBasePermissionToken(): PermissionToken {
441
- return { token: "" };
442
- }
443
-
444
- export const PermissionToken = {
445
- encode(message: PermissionToken, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
446
- if (message.token !== "") {
447
- writer.uint32(10).string(message.token);
448
- }
449
- return writer;
450
- },
451
-
452
- decode(input: _m0.Reader | Uint8Array, length?: number): PermissionToken {
453
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
454
- let end = length === undefined ? reader.len : reader.pos + length;
455
- const message = createBasePermissionToken();
456
- while (reader.pos < end) {
457
- const tag = reader.uint32();
458
- switch (tag >>> 3) {
459
- case 1:
460
- message.token = reader.string();
461
- break;
462
- default:
463
- reader.skipType(tag & 7);
464
- break;
465
- }
466
- }
467
- return message;
468
- },
469
-
470
- fromJSON(object: any): PermissionToken {
471
- return { token: isSet(object.token) ? String(object.token) : "" };
472
- },
473
-
474
- toJSON(message: PermissionToken): unknown {
475
- const obj: any = {};
476
- message.token !== undefined && (obj.token = message.token);
477
- return obj;
478
- },
479
-
480
- fromPartial<I extends Exact<DeepPartial<PermissionToken>, I>>(object: I): PermissionToken {
481
- const message = createBasePermissionToken();
482
- message.token = object.token ?? "";
483
- return message;
484
- },
485
- };
486
-
487
- function createBasePermissionStatus(): PermissionStatus {
488
- return {};
489
- }
490
-
491
- export const PermissionStatus = {
492
- encode(_: PermissionStatus, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
493
- return writer;
494
- },
495
-
496
- decode(input: _m0.Reader | Uint8Array, length?: number): PermissionStatus {
497
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
498
- let end = length === undefined ? reader.len : reader.pos + length;
499
- const message = createBasePermissionStatus();
500
- while (reader.pos < end) {
501
- const tag = reader.uint32();
502
- switch (tag >>> 3) {
503
- default:
504
- reader.skipType(tag & 7);
505
- break;
506
- }
507
- }
508
- return message;
509
- },
510
-
511
- fromJSON(_: any): PermissionStatus {
512
- return {};
513
- },
514
-
515
- toJSON(_: PermissionStatus): unknown {
516
- const obj: any = {};
517
- return obj;
518
- },
519
-
520
- fromPartial<I extends Exact<DeepPartial<PermissionStatus>, I>>(_: I): PermissionStatus {
521
- const message = createBasePermissionStatus();
522
- return message;
523
- },
524
- };
525
-
526
- function createBaseHasPermissionRequest(): HasPermissionRequest {
527
- return { perm: 0 };
528
- }
529
-
530
- export const HasPermissionRequest = {
531
- encode(message: HasPermissionRequest, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer {
532
- if (message.perm !== 0) {
533
- writer.uint32(8).int32(message.perm);
534
- }
535
- return writer;
536
- },
537
-
538
- decode(input: _m0.Reader | Uint8Array, length?: number): HasPermissionRequest {
539
- const reader = input instanceof _m0.Reader ? input : new _m0.Reader(input);
540
- let end = length === undefined ? reader.len : reader.pos + length;
541
- const message = createBaseHasPermissionRequest();
542
- while (reader.pos < end) {
543
- const tag = reader.uint32();
544
- switch (tag >>> 3) {
545
- case 1:
546
- message.perm = reader.int32() as any;
547
- break;
548
- default:
549
- reader.skipType(tag & 7);
550
- break;
551
- }
552
- }
553
- return message;
554
- },
555
-
556
- fromJSON(object: any): HasPermissionRequest {
557
- return { perm: isSet(object.perm) ? permissionFromJSON(object.perm) : 0 };
558
- },
559
-
560
- toJSON(message: HasPermissionRequest): unknown {
561
- const obj: any = {};
562
- message.perm !== undefined && (obj.perm = permissionToJSON(message.perm));
563
- return obj;
564
- },
565
-
566
- fromPartial<I extends Exact<DeepPartial<HasPermissionRequest>, I>>(object: I): HasPermissionRequest {
567
- const message = createBaseHasPermissionRequest();
568
- message.perm = object.perm ?? 0;
569
- return message;
570
- },
571
- };
572
-
573
- export interface PermissionManager {
574
- Request(request: DeepPartial<PermissionDesc>, metadata?: grpc.Metadata): Promise<PermissionToken>;
575
- Has(request: DeepPartial<HasPermissionRequest>, metadata?: grpc.Metadata): Promise<PermissionStatus>;
576
- }
577
-
578
- export class PermissionManagerClientImpl implements PermissionManager {
579
- private readonly rpc: Rpc;
580
-
581
- constructor(rpc: Rpc) {
582
- this.rpc = rpc;
583
- this.Request = this.Request.bind(this);
584
- this.Has = this.Has.bind(this);
585
- }
586
-
587
- Request(request: DeepPartial<PermissionDesc>, metadata?: grpc.Metadata): Promise<PermissionToken> {
588
- return this.rpc.unary(PermissionManagerRequestDesc, PermissionDesc.fromPartial(request), metadata);
589
- }
590
-
591
- Has(request: DeepPartial<HasPermissionRequest>, metadata?: grpc.Metadata): Promise<PermissionStatus> {
592
- return this.rpc.unary(PermissionManagerHasDesc, HasPermissionRequest.fromPartial(request), metadata);
593
- }
594
- }
595
-
596
- export const PermissionManagerDesc = { serviceName: "cloud.lazycat.apis.common.PermissionManager" };
597
-
598
- export const PermissionManagerRequestDesc: UnaryMethodDefinitionish = {
599
- methodName: "Request",
600
- service: PermissionManagerDesc,
601
- requestStream: false,
602
- responseStream: false,
603
- requestType: {
604
- serializeBinary() {
605
- return PermissionDesc.encode(this).finish();
606
- },
607
- } as any,
608
- responseType: {
609
- deserializeBinary(data: Uint8Array) {
610
- return {
611
- ...PermissionToken.decode(data),
612
- toObject() {
613
- return this;
614
- },
615
- };
616
- },
617
- } as any,
618
- };
619
-
620
- export const PermissionManagerHasDesc: UnaryMethodDefinitionish = {
621
- methodName: "Has",
622
- service: PermissionManagerDesc,
623
- requestStream: false,
624
- responseStream: false,
625
- requestType: {
626
- serializeBinary() {
627
- return HasPermissionRequest.encode(this).finish();
628
- },
629
- } as any,
630
- responseType: {
631
- deserializeBinary(data: Uint8Array) {
632
- return {
633
- ...PermissionStatus.decode(data),
634
- toObject() {
635
- return this;
636
- },
637
- };
638
- },
639
- } as any,
640
- };
641
-
642
- interface UnaryMethodDefinitionishR extends grpc.UnaryMethodDefinition<any, any> {
643
- requestStream: any;
644
- responseStream: any;
645
- }
646
-
647
- type UnaryMethodDefinitionish = UnaryMethodDefinitionishR;
648
-
649
- interface Rpc {
650
- unary<T extends UnaryMethodDefinitionish>(
651
- methodDesc: T,
652
- request: any,
653
- metadata: grpc.Metadata | undefined,
654
- ): Promise<any>;
655
- }
656
-
657
- export class GrpcWebImpl {
658
- private host: string;
659
- private options: {
660
- transport?: grpc.TransportFactory;
661
-
662
- debug?: boolean;
663
- metadata?: grpc.Metadata;
664
- upStreamRetryCodes?: number[];
665
- };
666
-
667
- constructor(
668
- host: string,
669
- options: {
670
- transport?: grpc.TransportFactory;
671
-
672
- debug?: boolean;
673
- metadata?: grpc.Metadata;
674
- upStreamRetryCodes?: number[];
675
- },
676
- ) {
677
- this.host = host;
678
- this.options = options;
679
- }
680
-
681
- unary<T extends UnaryMethodDefinitionish>(
682
- methodDesc: T,
683
- _request: any,
684
- metadata: grpc.Metadata | undefined,
685
- ): Promise<any> {
686
- const request = { ..._request, ...methodDesc.requestType };
687
- const maybeCombinedMetadata = metadata && this.options.metadata
688
- ? new BrowserHeaders({ ...this.options?.metadata.headersMap, ...metadata?.headersMap })
689
- : metadata || this.options.metadata;
690
- return new Promise((resolve, reject) => {
691
- grpc.unary(methodDesc, {
692
- request,
693
- host: this.host,
694
- metadata: maybeCombinedMetadata,
695
- transport: this.options.transport,
696
- debug: this.options.debug,
697
- onEnd: function (response) {
698
- if (response.status === grpc.Code.OK) {
699
- resolve(response.message);
700
- } else {
701
- const err = new GrpcWebError(response.statusMessage, response.status, response.trailers);
702
- reject(err);
703
- }
704
- },
705
- });
706
- });
707
- }
708
- }
709
-
710
- type Builtin = Date | Function | Uint8Array | string | number | boolean | undefined;
711
-
712
- type DeepPartial<T> = T extends Builtin ? T
713
- : T extends Array<infer U> ? Array<DeepPartial<U>> : T extends ReadonlyArray<infer U> ? ReadonlyArray<DeepPartial<U>>
714
- : T extends {} ? { [K in keyof T]?: DeepPartial<T[K]> }
715
- : Partial<T>;
716
-
717
- type KeysOfUnion<T> = T extends T ? keyof T : never;
718
- type Exact<P, I extends P> = P extends Builtin ? P
719
- : P & { [K in keyof P]: Exact<P[K], I[K]> } & { [K in Exclude<keyof I, KeysOfUnion<P>>]: never };
720
-
721
- function isSet(value: any): boolean {
722
- return value !== null && value !== undefined;
723
- }
724
-
725
- export class GrpcWebError extends Error {
726
- constructor(message: string, public code: grpc.Code, public metadata: grpc.Metadata) {
727
- super(message);
728
- }
729
- }