mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00

Follow up to file-moves done in the previous commit. The commit contains purely mechanical consequences of execution (apart of scripts/genproto.sh): % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/etcdserver/api/v3rpc/rpctypes|v3/api/v3rpc/rpctypes|g' % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/version|v3/api/version|g' % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/mvcc/mvccpb|v3/api/mvccpb|g' % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/etcdserver/etcdserverpb|v3/api/etcdserverpb|g' % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/etcdserver/api/membership/membershippb|v3/api/membershippb|g' % find ./ -name '*.go' | xargs sed --follow-symlinks -i 's|v3/auth/authpb|v3/api/authpb|g' % find ./ -name '*.proto' -o -name '*.md' | xargs -L 1 sed --follow-symlinks -i 's|/mvcc/mvccpb/kv.proto|/api/mvccpb/kv.proto|g' % find ./ -name '*.proto' -o -name '*.md' | xargs -L 1 sed --follow-symlinks -i 's|/auth/authpb/auth.proto|/api/authpb/auth.proto|g' % find ./ -name '*.proto' -o -name '*.md' | xargs -L 1 sed --follow-symlinks -i 's|/etcdserver/api/membership/membershippb/membership.proto|/api/membershippb/membership.proto|g' I also modified manually paths in scripts/genproto.sh. % go fmt ./...
116 lines
4.4 KiB
Go
116 lines
4.4 KiB
Go
// Copyright 2016 The etcd Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package grpcproxy
|
|
|
|
import (
|
|
"context"
|
|
|
|
pb "go.etcd.io/etcd/api/v3/etcdserverpb"
|
|
"go.etcd.io/etcd/v3/clientv3"
|
|
)
|
|
|
|
type AuthProxy struct {
|
|
client *clientv3.Client
|
|
}
|
|
|
|
func NewAuthProxy(c *clientv3.Client) pb.AuthServer {
|
|
return &AuthProxy{client: c}
|
|
}
|
|
|
|
func (ap *AuthProxy) AuthEnable(ctx context.Context, r *pb.AuthEnableRequest) (*pb.AuthEnableResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).AuthEnable(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) AuthDisable(ctx context.Context, r *pb.AuthDisableRequest) (*pb.AuthDisableResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).AuthDisable(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) AuthStatus(ctx context.Context, r *pb.AuthStatusRequest) (*pb.AuthStatusResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).AuthStatus(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) Authenticate(ctx context.Context, r *pb.AuthenticateRequest) (*pb.AuthenticateResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).Authenticate(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleAdd(ctx context.Context, r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleAdd(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleDelete(ctx context.Context, r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleDelete(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleGet(ctx context.Context, r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleGet(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleList(ctx context.Context, r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleList(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleRevokePermission(ctx context.Context, r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleRevokePermission(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) RoleGrantPermission(ctx context.Context, r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).RoleGrantPermission(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserAdd(ctx context.Context, r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserAdd(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserDelete(ctx context.Context, r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserDelete(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserGet(ctx context.Context, r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserGet(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserList(ctx context.Context, r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserList(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserGrantRole(ctx context.Context, r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserGrantRole(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserRevokeRole(ctx context.Context, r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserRevokeRole(ctx, r)
|
|
}
|
|
|
|
func (ap *AuthProxy) UserChangePassword(ctx context.Context, r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
|
|
conn := ap.client.ActiveConnection()
|
|
return pb.NewAuthClient(conn).UserChangePassword(ctx, r)
|
|
}
|