refactor(useragent): using request/response for correct multiplexing behaviour
This commit is contained in:
@@ -30,15 +30,18 @@ Future<Connection> connectAndAuthorize(
|
|||||||
KeyAlgorithm.ed25519 => KeyType.KEY_TYPE_ED25519,
|
KeyAlgorithm.ed25519 => KeyType.KEY_TYPE_ED25519,
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
await connection.send(UserAgentRequest(authChallengeRequest: req));
|
final response = await connection.request(
|
||||||
|
UserAgentRequest(authChallengeRequest: req),
|
||||||
|
);
|
||||||
talker.info(
|
talker.info(
|
||||||
"Sent auth challenge request with pubkey ${base64Encode(pubkey)}",
|
"Sent auth challenge request with pubkey ${base64Encode(pubkey)}",
|
||||||
);
|
);
|
||||||
|
|
||||||
final response = await connection.receive();
|
|
||||||
talker.info('Received response from server, checking auth flow...');
|
talker.info('Received response from server, checking auth flow...');
|
||||||
|
|
||||||
if (response.hasAuthOk()) {
|
if (response.hasAuthResult()) {
|
||||||
|
if (response.authResult != AuthResult.AUTH_RESULT_SUCCESS) {
|
||||||
|
throw Exception('Authentication failed: ${response.authResult}');
|
||||||
|
}
|
||||||
talker.info('Authentication successful, connection established');
|
talker.info('Authentication successful, connection established');
|
||||||
return connection;
|
return connection;
|
||||||
}
|
}
|
||||||
@@ -55,18 +58,20 @@ Future<Connection> connectAndAuthorize(
|
|||||||
);
|
);
|
||||||
|
|
||||||
final signature = await key.sign(challenge);
|
final signature = await key.sign(challenge);
|
||||||
await connection.send(
|
final solutionResponse = await connection.request(
|
||||||
UserAgentRequest(authChallengeSolution: AuthChallengeSolution(signature: signature)),
|
UserAgentRequest(authChallengeSolution: AuthChallengeSolution(signature: signature)),
|
||||||
);
|
);
|
||||||
|
|
||||||
talker.info('Sent auth challenge solution, waiting for server response...');
|
talker.info('Sent auth challenge solution, waiting for server response...');
|
||||||
|
|
||||||
final solutionResponse = await connection.receive();
|
if (!solutionResponse.hasAuthResult()) {
|
||||||
if (!solutionResponse.hasAuthOk()) {
|
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected AuthChallengeSolutionResponse, got ${solutionResponse.whichPayload()}',
|
'Expected AuthChallengeSolutionResponse, got ${solutionResponse.whichPayload()}',
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
if (solutionResponse.authResult != AuthResult.AUTH_RESULT_SUCCESS) {
|
||||||
|
throw Exception('Authentication failed: ${solutionResponse.authResult}');
|
||||||
|
}
|
||||||
|
|
||||||
talker.info('Authentication successful, connection established');
|
talker.info('Authentication successful, connection established');
|
||||||
return connection;
|
return connection;
|
||||||
|
|||||||
@@ -5,33 +5,113 @@ import 'package:grpc/grpc.dart';
|
|||||||
import 'package:mtcore/markettakers.dart';
|
import 'package:mtcore/markettakers.dart';
|
||||||
|
|
||||||
class Connection {
|
class Connection {
|
||||||
final ClientChannel channel;
|
|
||||||
final StreamController<UserAgentRequest> _tx;
|
|
||||||
final StreamIterator<UserAgentResponse> _rx;
|
|
||||||
|
|
||||||
Connection({
|
Connection({
|
||||||
required this.channel,
|
required this.channel,
|
||||||
required StreamController<UserAgentRequest> tx,
|
required StreamController<UserAgentRequest> tx,
|
||||||
required ResponseStream<UserAgentResponse> rx,
|
required ResponseStream<UserAgentResponse> rx,
|
||||||
}) : _tx = tx,
|
}) : _tx = tx {
|
||||||
_rx = StreamIterator(rx);
|
_rxSubscription = rx.listen(
|
||||||
|
_handleResponse,
|
||||||
Future<void> send(UserAgentRequest request) async {
|
onError: _handleError,
|
||||||
talker.debug('Sending request: ${request.toDebugString()}');
|
onDone: _handleDone,
|
||||||
_tx.add(request);
|
cancelOnError: true,
|
||||||
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
Future<UserAgentResponse> receive() async {
|
final ClientChannel channel;
|
||||||
final hasValue = await _rx.moveNext();
|
final StreamController<UserAgentRequest> _tx;
|
||||||
if (!hasValue) {
|
final Map<int, Completer<UserAgentResponse>> _pendingRequests = {};
|
||||||
throw Exception('Connection closed while waiting for server response.');
|
final StreamController<UserAgentResponse> _outOfBandMessages =
|
||||||
|
StreamController<UserAgentResponse>.broadcast();
|
||||||
|
|
||||||
|
StreamSubscription<UserAgentResponse>? _rxSubscription;
|
||||||
|
int _nextRequestId = 0;
|
||||||
|
|
||||||
|
Stream<UserAgentResponse> get outOfBandMessages => _outOfBandMessages.stream;
|
||||||
|
|
||||||
|
Future<UserAgentResponse> request(UserAgentRequest message) async {
|
||||||
|
_ensureOpen();
|
||||||
|
|
||||||
|
final requestId = _nextRequestId++;
|
||||||
|
final completer = Completer<UserAgentResponse>();
|
||||||
|
_pendingRequests[requestId] = completer;
|
||||||
|
|
||||||
|
message.id = requestId;
|
||||||
|
talker.debug('Sending request: ${message.toDebugString()}');
|
||||||
|
|
||||||
|
try {
|
||||||
|
_tx.add(message);
|
||||||
|
} catch (error, stackTrace) {
|
||||||
|
_pendingRequests.remove(requestId);
|
||||||
|
completer.completeError(error, stackTrace);
|
||||||
}
|
}
|
||||||
talker.debug('Received response: ${_rx.current.toDebugString()}');
|
|
||||||
return _rx.current;
|
return completer.future;
|
||||||
}
|
}
|
||||||
|
|
||||||
Future<void> close() async {
|
Future<void> close() async {
|
||||||
|
final rxSubscription = _rxSubscription;
|
||||||
|
if (rxSubscription == null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
_rxSubscription = null;
|
||||||
|
await rxSubscription.cancel();
|
||||||
|
_failPendingRequests(Exception('Connection closed.'));
|
||||||
|
await _outOfBandMessages.close();
|
||||||
await _tx.close();
|
await _tx.close();
|
||||||
await channel.shutdown();
|
await channel.shutdown();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void _handleResponse(UserAgentResponse response) {
|
||||||
|
talker.debug('Received response: ${response.toDebugString()}');
|
||||||
|
|
||||||
|
if (response.hasId()) {
|
||||||
|
final completer = _pendingRequests.remove(response.id);
|
||||||
|
if (completer == null) {
|
||||||
|
talker.warning('Received response for unknown request id ${response.id}');
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
completer.complete(response);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
_outOfBandMessages.add(response);
|
||||||
|
}
|
||||||
|
|
||||||
|
void _handleError(Object error, StackTrace stackTrace) {
|
||||||
|
_rxSubscription = null;
|
||||||
|
_failPendingRequests(error, stackTrace);
|
||||||
|
_outOfBandMessages.addError(error, stackTrace);
|
||||||
|
}
|
||||||
|
|
||||||
|
void _handleDone() {
|
||||||
|
if (_rxSubscription == null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
_rxSubscription = null;
|
||||||
|
final error = Exception(
|
||||||
|
'Connection closed while waiting for server response.',
|
||||||
|
);
|
||||||
|
_failPendingRequests(error);
|
||||||
|
_outOfBandMessages.close();
|
||||||
|
}
|
||||||
|
|
||||||
|
void _failPendingRequests(Object error, [StackTrace? stackTrace]) {
|
||||||
|
final pendingRequests = _pendingRequests.values.toList(growable: false);
|
||||||
|
_pendingRequests.clear();
|
||||||
|
|
||||||
|
for (final completer in pendingRequests) {
|
||||||
|
if (!completer.isCompleted) {
|
||||||
|
completer.completeError(error, stackTrace);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void _ensureOpen() {
|
||||||
|
if (_rxSubscription == null) {
|
||||||
|
throw StateError('Connection is closed.');
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,9 +4,9 @@ import 'package:arbiter/proto/user_agent.pb.dart';
|
|||||||
import 'package:protobuf/well_known_types/google/protobuf/empty.pb.dart';
|
import 'package:protobuf/well_known_types/google/protobuf/empty.pb.dart';
|
||||||
|
|
||||||
Future<List<WalletEntry>> listEvmWallets(Connection connection) async {
|
Future<List<WalletEntry>> listEvmWallets(Connection connection) async {
|
||||||
await connection.send(UserAgentRequest(evmWalletList: Empty()));
|
final response = await connection.request(
|
||||||
|
UserAgentRequest(evmWalletList: Empty()),
|
||||||
final response = await connection.receive();
|
);
|
||||||
if (!response.hasEvmWalletList()) {
|
if (!response.hasEvmWalletList()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected EVM wallet list response, got ${response.whichPayload()}',
|
'Expected EVM wallet list response, got ${response.whichPayload()}',
|
||||||
@@ -25,9 +25,9 @@ Future<List<WalletEntry>> listEvmWallets(Connection connection) async {
|
|||||||
}
|
}
|
||||||
|
|
||||||
Future<void> createEvmWallet(Connection connection) async {
|
Future<void> createEvmWallet(Connection connection) async {
|
||||||
await connection.send(UserAgentRequest(evmWalletCreate: Empty()));
|
final response = await connection.request(
|
||||||
|
UserAgentRequest(evmWalletCreate: Empty()),
|
||||||
final response = await connection.receive();
|
);
|
||||||
if (!response.hasEvmWalletCreate()) {
|
if (!response.hasEvmWalletCreate()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected EVM wallet create response, got ${response.whichPayload()}',
|
'Expected EVM wallet create response, got ${response.whichPayload()}',
|
||||||
|
|||||||
@@ -13,9 +13,9 @@ Future<List<GrantEntry>> listEvmGrants(
|
|||||||
request.walletId = walletId;
|
request.walletId = walletId;
|
||||||
}
|
}
|
||||||
|
|
||||||
await connection.send(UserAgentRequest(evmGrantList: request));
|
final response = await connection.request(
|
||||||
|
UserAgentRequest(evmGrantList: request),
|
||||||
final response = await connection.receive();
|
);
|
||||||
if (!response.hasEvmGrantList()) {
|
if (!response.hasEvmGrantList()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected EVM grant list response, got ${response.whichPayload()}',
|
'Expected EVM grant list response, got ${response.whichPayload()}',
|
||||||
@@ -45,7 +45,7 @@ Future<int> createEvmGrant(
|
|||||||
TransactionRateLimit? rateLimit,
|
TransactionRateLimit? rateLimit,
|
||||||
required SpecificGrant specific,
|
required SpecificGrant specific,
|
||||||
}) async {
|
}) async {
|
||||||
await connection.send(
|
final response = await connection.request(
|
||||||
UserAgentRequest(
|
UserAgentRequest(
|
||||||
evmGrantCreate: EvmGrantCreateRequest(
|
evmGrantCreate: EvmGrantCreateRequest(
|
||||||
clientId: clientId,
|
clientId: clientId,
|
||||||
@@ -62,8 +62,6 @@ Future<int> createEvmGrant(
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
);
|
);
|
||||||
|
|
||||||
final response = await connection.receive();
|
|
||||||
if (!response.hasEvmGrantCreate()) {
|
if (!response.hasEvmGrantCreate()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected EVM grant create response, got ${response.whichPayload()}',
|
'Expected EVM grant create response, got ${response.whichPayload()}',
|
||||||
@@ -82,11 +80,9 @@ Future<int> createEvmGrant(
|
|||||||
}
|
}
|
||||||
|
|
||||||
Future<void> deleteEvmGrant(Connection connection, int grantId) async {
|
Future<void> deleteEvmGrant(Connection connection, int grantId) async {
|
||||||
await connection.send(
|
final response = await connection.request(
|
||||||
UserAgentRequest(evmGrantDelete: EvmGrantDeleteRequest(grantId: grantId)),
|
UserAgentRequest(evmGrantDelete: EvmGrantDeleteRequest(grantId: grantId)),
|
||||||
);
|
);
|
||||||
|
|
||||||
final response = await connection.receive();
|
|
||||||
if (!response.hasEvmGrantDelete()) {
|
if (!response.hasEvmGrantDelete()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected EVM grant delete response, got ${response.whichPayload()}',
|
'Expected EVM grant delete response, got ${response.whichPayload()}',
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ Future<BootstrapResult> bootstrapVault(
|
|||||||
) async {
|
) async {
|
||||||
final encryptedKey = await _encryptVaultKeyMaterial(connection, password);
|
final encryptedKey = await _encryptVaultKeyMaterial(connection, password);
|
||||||
|
|
||||||
await connection.send(
|
final response = await connection.request(
|
||||||
UserAgentRequest(
|
UserAgentRequest(
|
||||||
bootstrapEncryptedKey: BootstrapEncryptedKey(
|
bootstrapEncryptedKey: BootstrapEncryptedKey(
|
||||||
nonce: encryptedKey.nonce,
|
nonce: encryptedKey.nonce,
|
||||||
@@ -19,8 +19,6 @@ Future<BootstrapResult> bootstrapVault(
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
);
|
);
|
||||||
|
|
||||||
final response = await connection.receive();
|
|
||||||
if (!response.hasBootstrapResult()) {
|
if (!response.hasBootstrapResult()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected bootstrap result, got ${response.whichPayload()}',
|
'Expected bootstrap result, got ${response.whichPayload()}',
|
||||||
@@ -33,7 +31,7 @@ Future<BootstrapResult> bootstrapVault(
|
|||||||
Future<UnsealResult> unsealVault(Connection connection, String password) async {
|
Future<UnsealResult> unsealVault(Connection connection, String password) async {
|
||||||
final encryptedKey = await _encryptVaultKeyMaterial(connection, password);
|
final encryptedKey = await _encryptVaultKeyMaterial(connection, password);
|
||||||
|
|
||||||
await connection.send(
|
final response = await connection.request(
|
||||||
UserAgentRequest(
|
UserAgentRequest(
|
||||||
unsealEncryptedKey: UnsealEncryptedKey(
|
unsealEncryptedKey: UnsealEncryptedKey(
|
||||||
nonce: encryptedKey.nonce,
|
nonce: encryptedKey.nonce,
|
||||||
@@ -42,8 +40,6 @@ Future<UnsealResult> unsealVault(Connection connection, String password) async {
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
);
|
);
|
||||||
|
|
||||||
final response = await connection.receive();
|
|
||||||
if (!response.hasUnsealResult()) {
|
if (!response.hasUnsealResult()) {
|
||||||
throw Exception('Expected unseal result, got ${response.whichPayload()}');
|
throw Exception('Expected unseal result, got ${response.whichPayload()}');
|
||||||
}
|
}
|
||||||
@@ -60,11 +56,9 @@ Future<_EncryptedVaultKey> _encryptVaultKeyMaterial(
|
|||||||
final clientKeyPair = await keyExchange.newKeyPair();
|
final clientKeyPair = await keyExchange.newKeyPair();
|
||||||
final clientPublicKey = await clientKeyPair.extractPublicKey();
|
final clientPublicKey = await clientKeyPair.extractPublicKey();
|
||||||
|
|
||||||
await connection.send(
|
final handshakeResponse = await connection.request(
|
||||||
UserAgentRequest(unsealStart: UnsealStart(clientPubkey: clientPublicKey.bytes)),
|
UserAgentRequest(unsealStart: UnsealStart(clientPubkey: clientPublicKey.bytes)),
|
||||||
);
|
);
|
||||||
|
|
||||||
final handshakeResponse = await connection.receive();
|
|
||||||
if (!handshakeResponse.hasUnsealStartResponse()) {
|
if (!handshakeResponse.hasUnsealStartResponse()) {
|
||||||
throw Exception(
|
throw Exception(
|
||||||
'Expected unseal handshake response, got ${handshakeResponse.whichPayload()}',
|
'Expected unseal handshake response, got ${handshakeResponse.whichPayload()}',
|
||||||
|
|||||||
@@ -13,9 +13,10 @@
|
|||||||
import 'dart:core' as $core;
|
import 'dart:core' as $core;
|
||||||
|
|
||||||
import 'package:protobuf/protobuf.dart' as $pb;
|
import 'package:protobuf/protobuf.dart' as $pb;
|
||||||
|
import 'package:protobuf/well_known_types/google/protobuf/empty.pb.dart' as $0;
|
||||||
|
|
||||||
import 'client.pbenum.dart';
|
import 'client.pbenum.dart';
|
||||||
import 'evm.pb.dart' as $0;
|
import 'evm.pb.dart' as $1;
|
||||||
|
|
||||||
export 'package:protobuf/protobuf.dart' show GeneratedMessageGenericExtensions;
|
export 'package:protobuf/protobuf.dart' show GeneratedMessageGenericExtensions;
|
||||||
|
|
||||||
@@ -199,46 +200,10 @@ class AuthChallengeSolution extends $pb.GeneratedMessage {
|
|||||||
void clearSignature() => $_clearField(1);
|
void clearSignature() => $_clearField(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
class AuthOk extends $pb.GeneratedMessage {
|
|
||||||
factory AuthOk() => create();
|
|
||||||
|
|
||||||
AuthOk._();
|
|
||||||
|
|
||||||
factory AuthOk.fromBuffer($core.List<$core.int> data,
|
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
|
||||||
create()..mergeFromBuffer(data, registry);
|
|
||||||
factory AuthOk.fromJson($core.String json,
|
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
|
||||||
create()..mergeFromJson(json, registry);
|
|
||||||
|
|
||||||
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
|
||||||
_omitMessageNames ? '' : 'AuthOk',
|
|
||||||
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
|
||||||
createEmptyInstance: create)
|
|
||||||
..hasRequiredFields = false;
|
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
AuthOk clone() => deepCopy();
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
AuthOk copyWith(void Function(AuthOk) updates) =>
|
|
||||||
super.copyWith((message) => updates(message as AuthOk)) as AuthOk;
|
|
||||||
|
|
||||||
@$core.override
|
|
||||||
$pb.BuilderInfo get info_ => _i;
|
|
||||||
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static AuthOk create() => AuthOk._();
|
|
||||||
@$core.override
|
|
||||||
AuthOk createEmptyInstance() => create();
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static AuthOk getDefault() =>
|
|
||||||
_defaultInstance ??= $pb.GeneratedMessage.$_defaultFor<AuthOk>(create);
|
|
||||||
static AuthOk? _defaultInstance;
|
|
||||||
}
|
|
||||||
|
|
||||||
enum ClientRequest_Payload {
|
enum ClientRequest_Payload {
|
||||||
authChallengeRequest,
|
authChallengeRequest,
|
||||||
authChallengeSolution,
|
authChallengeSolution,
|
||||||
|
queryVaultState,
|
||||||
notSet
|
notSet
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -246,12 +211,16 @@ class ClientRequest extends $pb.GeneratedMessage {
|
|||||||
factory ClientRequest({
|
factory ClientRequest({
|
||||||
AuthChallengeRequest? authChallengeRequest,
|
AuthChallengeRequest? authChallengeRequest,
|
||||||
AuthChallengeSolution? authChallengeSolution,
|
AuthChallengeSolution? authChallengeSolution,
|
||||||
|
$0.Empty? queryVaultState,
|
||||||
|
$core.int? requestId,
|
||||||
}) {
|
}) {
|
||||||
final result = create();
|
final result = create();
|
||||||
if (authChallengeRequest != null)
|
if (authChallengeRequest != null)
|
||||||
result.authChallengeRequest = authChallengeRequest;
|
result.authChallengeRequest = authChallengeRequest;
|
||||||
if (authChallengeSolution != null)
|
if (authChallengeSolution != null)
|
||||||
result.authChallengeSolution = authChallengeSolution;
|
result.authChallengeSolution = authChallengeSolution;
|
||||||
|
if (queryVaultState != null) result.queryVaultState = queryVaultState;
|
||||||
|
if (requestId != null) result.requestId = requestId;
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -268,19 +237,23 @@ class ClientRequest extends $pb.GeneratedMessage {
|
|||||||
_ClientRequest_PayloadByTag = {
|
_ClientRequest_PayloadByTag = {
|
||||||
1: ClientRequest_Payload.authChallengeRequest,
|
1: ClientRequest_Payload.authChallengeRequest,
|
||||||
2: ClientRequest_Payload.authChallengeSolution,
|
2: ClientRequest_Payload.authChallengeSolution,
|
||||||
|
3: ClientRequest_Payload.queryVaultState,
|
||||||
0: ClientRequest_Payload.notSet
|
0: ClientRequest_Payload.notSet
|
||||||
};
|
};
|
||||||
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
||||||
_omitMessageNames ? '' : 'ClientRequest',
|
_omitMessageNames ? '' : 'ClientRequest',
|
||||||
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
||||||
createEmptyInstance: create)
|
createEmptyInstance: create)
|
||||||
..oo(0, [1, 2])
|
..oo(0, [1, 2, 3])
|
||||||
..aOM<AuthChallengeRequest>(
|
..aOM<AuthChallengeRequest>(
|
||||||
1, _omitFieldNames ? '' : 'authChallengeRequest',
|
1, _omitFieldNames ? '' : 'authChallengeRequest',
|
||||||
subBuilder: AuthChallengeRequest.create)
|
subBuilder: AuthChallengeRequest.create)
|
||||||
..aOM<AuthChallengeSolution>(
|
..aOM<AuthChallengeSolution>(
|
||||||
2, _omitFieldNames ? '' : 'authChallengeSolution',
|
2, _omitFieldNames ? '' : 'authChallengeSolution',
|
||||||
subBuilder: AuthChallengeSolution.create)
|
subBuilder: AuthChallengeSolution.create)
|
||||||
|
..aOM<$0.Empty>(3, _omitFieldNames ? '' : 'queryVaultState',
|
||||||
|
subBuilder: $0.Empty.create)
|
||||||
|
..aI(4, _omitFieldNames ? '' : 'requestId')
|
||||||
..hasRequiredFields = false;
|
..hasRequiredFields = false;
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
||||||
@@ -304,10 +277,12 @@ class ClientRequest extends $pb.GeneratedMessage {
|
|||||||
|
|
||||||
@$pb.TagNumber(1)
|
@$pb.TagNumber(1)
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
|
@$pb.TagNumber(3)
|
||||||
ClientRequest_Payload whichPayload() =>
|
ClientRequest_Payload whichPayload() =>
|
||||||
_ClientRequest_PayloadByTag[$_whichOneof(0)]!;
|
_ClientRequest_PayloadByTag[$_whichOneof(0)]!;
|
||||||
@$pb.TagNumber(1)
|
@$pb.TagNumber(1)
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
|
@$pb.TagNumber(3)
|
||||||
void clearPayload() => $_clearField($_whichOneof(0));
|
void clearPayload() => $_clearField($_whichOneof(0));
|
||||||
|
|
||||||
@$pb.TagNumber(1)
|
@$pb.TagNumber(1)
|
||||||
@@ -332,89 +307,55 @@ class ClientRequest extends $pb.GeneratedMessage {
|
|||||||
void clearAuthChallengeSolution() => $_clearField(2);
|
void clearAuthChallengeSolution() => $_clearField(2);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
AuthChallengeSolution ensureAuthChallengeSolution() => $_ensure(1);
|
AuthChallengeSolution ensureAuthChallengeSolution() => $_ensure(1);
|
||||||
}
|
|
||||||
|
|
||||||
class ClientConnectError extends $pb.GeneratedMessage {
|
@$pb.TagNumber(3)
|
||||||
factory ClientConnectError({
|
$0.Empty get queryVaultState => $_getN(2);
|
||||||
ClientConnectError_Code? code,
|
@$pb.TagNumber(3)
|
||||||
}) {
|
set queryVaultState($0.Empty value) => $_setField(3, value);
|
||||||
final result = create();
|
@$pb.TagNumber(3)
|
||||||
if (code != null) result.code = code;
|
$core.bool hasQueryVaultState() => $_has(2);
|
||||||
return result;
|
@$pb.TagNumber(3)
|
||||||
}
|
void clearQueryVaultState() => $_clearField(3);
|
||||||
|
@$pb.TagNumber(3)
|
||||||
|
$0.Empty ensureQueryVaultState() => $_ensure(2);
|
||||||
|
|
||||||
ClientConnectError._();
|
@$pb.TagNumber(4)
|
||||||
|
$core.int get requestId => $_getIZ(3);
|
||||||
factory ClientConnectError.fromBuffer($core.List<$core.int> data,
|
@$pb.TagNumber(4)
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
set requestId($core.int value) => $_setSignedInt32(3, value);
|
||||||
create()..mergeFromBuffer(data, registry);
|
@$pb.TagNumber(4)
|
||||||
factory ClientConnectError.fromJson($core.String json,
|
$core.bool hasRequestId() => $_has(3);
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
@$pb.TagNumber(4)
|
||||||
create()..mergeFromJson(json, registry);
|
void clearRequestId() => $_clearField(4);
|
||||||
|
|
||||||
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
|
||||||
_omitMessageNames ? '' : 'ClientConnectError',
|
|
||||||
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
|
||||||
createEmptyInstance: create)
|
|
||||||
..aE<ClientConnectError_Code>(1, _omitFieldNames ? '' : 'code',
|
|
||||||
enumValues: ClientConnectError_Code.values)
|
|
||||||
..hasRequiredFields = false;
|
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
ClientConnectError clone() => deepCopy();
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
ClientConnectError copyWith(void Function(ClientConnectError) updates) =>
|
|
||||||
super.copyWith((message) => updates(message as ClientConnectError))
|
|
||||||
as ClientConnectError;
|
|
||||||
|
|
||||||
@$core.override
|
|
||||||
$pb.BuilderInfo get info_ => _i;
|
|
||||||
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static ClientConnectError create() => ClientConnectError._();
|
|
||||||
@$core.override
|
|
||||||
ClientConnectError createEmptyInstance() => create();
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static ClientConnectError getDefault() => _defaultInstance ??=
|
|
||||||
$pb.GeneratedMessage.$_defaultFor<ClientConnectError>(create);
|
|
||||||
static ClientConnectError? _defaultInstance;
|
|
||||||
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
ClientConnectError_Code get code => $_getN(0);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
set code(ClientConnectError_Code value) => $_setField(1, value);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
$core.bool hasCode() => $_has(0);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
void clearCode() => $_clearField(1);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
enum ClientResponse_Payload {
|
enum ClientResponse_Payload {
|
||||||
authChallenge,
|
authChallenge,
|
||||||
authOk,
|
authResult,
|
||||||
evmSignTransaction,
|
evmSignTransaction,
|
||||||
evmAnalyzeTransaction,
|
evmAnalyzeTransaction,
|
||||||
clientConnectError,
|
vaultState,
|
||||||
notSet
|
notSet
|
||||||
}
|
}
|
||||||
|
|
||||||
class ClientResponse extends $pb.GeneratedMessage {
|
class ClientResponse extends $pb.GeneratedMessage {
|
||||||
factory ClientResponse({
|
factory ClientResponse({
|
||||||
AuthChallenge? authChallenge,
|
AuthChallenge? authChallenge,
|
||||||
AuthOk? authOk,
|
AuthResult? authResult,
|
||||||
$0.EvmSignTransactionResponse? evmSignTransaction,
|
$1.EvmSignTransactionResponse? evmSignTransaction,
|
||||||
$0.EvmAnalyzeTransactionResponse? evmAnalyzeTransaction,
|
$1.EvmAnalyzeTransactionResponse? evmAnalyzeTransaction,
|
||||||
ClientConnectError? clientConnectError,
|
VaultState? vaultState,
|
||||||
|
$core.int? requestId,
|
||||||
}) {
|
}) {
|
||||||
final result = create();
|
final result = create();
|
||||||
if (authChallenge != null) result.authChallenge = authChallenge;
|
if (authChallenge != null) result.authChallenge = authChallenge;
|
||||||
if (authOk != null) result.authOk = authOk;
|
if (authResult != null) result.authResult = authResult;
|
||||||
if (evmSignTransaction != null)
|
if (evmSignTransaction != null)
|
||||||
result.evmSignTransaction = evmSignTransaction;
|
result.evmSignTransaction = evmSignTransaction;
|
||||||
if (evmAnalyzeTransaction != null)
|
if (evmAnalyzeTransaction != null)
|
||||||
result.evmAnalyzeTransaction = evmAnalyzeTransaction;
|
result.evmAnalyzeTransaction = evmAnalyzeTransaction;
|
||||||
if (clientConnectError != null)
|
if (vaultState != null) result.vaultState = vaultState;
|
||||||
result.clientConnectError = clientConnectError;
|
if (requestId != null) result.requestId = requestId;
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -430,28 +371,30 @@ class ClientResponse extends $pb.GeneratedMessage {
|
|||||||
static const $core.Map<$core.int, ClientResponse_Payload>
|
static const $core.Map<$core.int, ClientResponse_Payload>
|
||||||
_ClientResponse_PayloadByTag = {
|
_ClientResponse_PayloadByTag = {
|
||||||
1: ClientResponse_Payload.authChallenge,
|
1: ClientResponse_Payload.authChallenge,
|
||||||
2: ClientResponse_Payload.authOk,
|
2: ClientResponse_Payload.authResult,
|
||||||
3: ClientResponse_Payload.evmSignTransaction,
|
3: ClientResponse_Payload.evmSignTransaction,
|
||||||
4: ClientResponse_Payload.evmAnalyzeTransaction,
|
4: ClientResponse_Payload.evmAnalyzeTransaction,
|
||||||
5: ClientResponse_Payload.clientConnectError,
|
6: ClientResponse_Payload.vaultState,
|
||||||
0: ClientResponse_Payload.notSet
|
0: ClientResponse_Payload.notSet
|
||||||
};
|
};
|
||||||
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
||||||
_omitMessageNames ? '' : 'ClientResponse',
|
_omitMessageNames ? '' : 'ClientResponse',
|
||||||
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
package: const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.client'),
|
||||||
createEmptyInstance: create)
|
createEmptyInstance: create)
|
||||||
..oo(0, [1, 2, 3, 4, 5])
|
..oo(0, [1, 2, 3, 4, 6])
|
||||||
..aOM<AuthChallenge>(1, _omitFieldNames ? '' : 'authChallenge',
|
..aOM<AuthChallenge>(1, _omitFieldNames ? '' : 'authChallenge',
|
||||||
subBuilder: AuthChallenge.create)
|
subBuilder: AuthChallenge.create)
|
||||||
..aOM<AuthOk>(2, _omitFieldNames ? '' : 'authOk', subBuilder: AuthOk.create)
|
..aE<AuthResult>(2, _omitFieldNames ? '' : 'authResult',
|
||||||
..aOM<$0.EvmSignTransactionResponse>(
|
enumValues: AuthResult.values)
|
||||||
|
..aOM<$1.EvmSignTransactionResponse>(
|
||||||
3, _omitFieldNames ? '' : 'evmSignTransaction',
|
3, _omitFieldNames ? '' : 'evmSignTransaction',
|
||||||
subBuilder: $0.EvmSignTransactionResponse.create)
|
subBuilder: $1.EvmSignTransactionResponse.create)
|
||||||
..aOM<$0.EvmAnalyzeTransactionResponse>(
|
..aOM<$1.EvmAnalyzeTransactionResponse>(
|
||||||
4, _omitFieldNames ? '' : 'evmAnalyzeTransaction',
|
4, _omitFieldNames ? '' : 'evmAnalyzeTransaction',
|
||||||
subBuilder: $0.EvmAnalyzeTransactionResponse.create)
|
subBuilder: $1.EvmAnalyzeTransactionResponse.create)
|
||||||
..aOM<ClientConnectError>(5, _omitFieldNames ? '' : 'clientConnectError',
|
..aE<VaultState>(6, _omitFieldNames ? '' : 'vaultState',
|
||||||
subBuilder: ClientConnectError.create)
|
enumValues: VaultState.values)
|
||||||
|
..aI(7, _omitFieldNames ? '' : 'requestId')
|
||||||
..hasRequiredFields = false;
|
..hasRequiredFields = false;
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
||||||
@@ -477,14 +420,14 @@ class ClientResponse extends $pb.GeneratedMessage {
|
|||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
ClientResponse_Payload whichPayload() =>
|
ClientResponse_Payload whichPayload() =>
|
||||||
_ClientResponse_PayloadByTag[$_whichOneof(0)]!;
|
_ClientResponse_PayloadByTag[$_whichOneof(0)]!;
|
||||||
@$pb.TagNumber(1)
|
@$pb.TagNumber(1)
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
void clearPayload() => $_clearField($_whichOneof(0));
|
void clearPayload() => $_clearField($_whichOneof(0));
|
||||||
|
|
||||||
@$pb.TagNumber(1)
|
@$pb.TagNumber(1)
|
||||||
@@ -499,50 +442,55 @@ class ClientResponse extends $pb.GeneratedMessage {
|
|||||||
AuthChallenge ensureAuthChallenge() => $_ensure(0);
|
AuthChallenge ensureAuthChallenge() => $_ensure(0);
|
||||||
|
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
AuthOk get authOk => $_getN(1);
|
AuthResult get authResult => $_getN(1);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
set authOk(AuthOk value) => $_setField(2, value);
|
set authResult(AuthResult value) => $_setField(2, value);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
$core.bool hasAuthOk() => $_has(1);
|
$core.bool hasAuthResult() => $_has(1);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
void clearAuthOk() => $_clearField(2);
|
void clearAuthResult() => $_clearField(2);
|
||||||
@$pb.TagNumber(2)
|
|
||||||
AuthOk ensureAuthOk() => $_ensure(1);
|
|
||||||
|
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
$0.EvmSignTransactionResponse get evmSignTransaction => $_getN(2);
|
$1.EvmSignTransactionResponse get evmSignTransaction => $_getN(2);
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
set evmSignTransaction($0.EvmSignTransactionResponse value) =>
|
set evmSignTransaction($1.EvmSignTransactionResponse value) =>
|
||||||
$_setField(3, value);
|
$_setField(3, value);
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
$core.bool hasEvmSignTransaction() => $_has(2);
|
$core.bool hasEvmSignTransaction() => $_has(2);
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
void clearEvmSignTransaction() => $_clearField(3);
|
void clearEvmSignTransaction() => $_clearField(3);
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
$0.EvmSignTransactionResponse ensureEvmSignTransaction() => $_ensure(2);
|
$1.EvmSignTransactionResponse ensureEvmSignTransaction() => $_ensure(2);
|
||||||
|
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
$0.EvmAnalyzeTransactionResponse get evmAnalyzeTransaction => $_getN(3);
|
$1.EvmAnalyzeTransactionResponse get evmAnalyzeTransaction => $_getN(3);
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
set evmAnalyzeTransaction($0.EvmAnalyzeTransactionResponse value) =>
|
set evmAnalyzeTransaction($1.EvmAnalyzeTransactionResponse value) =>
|
||||||
$_setField(4, value);
|
$_setField(4, value);
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
$core.bool hasEvmAnalyzeTransaction() => $_has(3);
|
$core.bool hasEvmAnalyzeTransaction() => $_has(3);
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
void clearEvmAnalyzeTransaction() => $_clearField(4);
|
void clearEvmAnalyzeTransaction() => $_clearField(4);
|
||||||
@$pb.TagNumber(4)
|
@$pb.TagNumber(4)
|
||||||
$0.EvmAnalyzeTransactionResponse ensureEvmAnalyzeTransaction() => $_ensure(3);
|
$1.EvmAnalyzeTransactionResponse ensureEvmAnalyzeTransaction() => $_ensure(3);
|
||||||
|
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
ClientConnectError get clientConnectError => $_getN(4);
|
VaultState get vaultState => $_getN(4);
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
set clientConnectError(ClientConnectError value) => $_setField(5, value);
|
set vaultState(VaultState value) => $_setField(6, value);
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
$core.bool hasClientConnectError() => $_has(4);
|
$core.bool hasVaultState() => $_has(4);
|
||||||
@$pb.TagNumber(5)
|
@$pb.TagNumber(6)
|
||||||
void clearClientConnectError() => $_clearField(5);
|
void clearVaultState() => $_clearField(6);
|
||||||
@$pb.TagNumber(5)
|
|
||||||
ClientConnectError ensureClientConnectError() => $_ensure(4);
|
@$pb.TagNumber(7)
|
||||||
|
$core.int get requestId => $_getIZ(5);
|
||||||
|
@$pb.TagNumber(7)
|
||||||
|
set requestId($core.int value) => $_setSignedInt32(5, value);
|
||||||
|
@$pb.TagNumber(7)
|
||||||
|
$core.bool hasRequestId() => $_has(5);
|
||||||
|
@$pb.TagNumber(7)
|
||||||
|
void clearRequestId() => $_clearField(7);
|
||||||
}
|
}
|
||||||
|
|
||||||
const $core.bool _omitFieldNames =
|
const $core.bool _omitFieldNames =
|
||||||
|
|||||||
@@ -14,28 +14,66 @@ import 'dart:core' as $core;
|
|||||||
|
|
||||||
import 'package:protobuf/protobuf.dart' as $pb;
|
import 'package:protobuf/protobuf.dart' as $pb;
|
||||||
|
|
||||||
class ClientConnectError_Code extends $pb.ProtobufEnum {
|
class AuthResult extends $pb.ProtobufEnum {
|
||||||
static const ClientConnectError_Code UNKNOWN =
|
static const AuthResult AUTH_RESULT_UNSPECIFIED =
|
||||||
ClientConnectError_Code._(0, _omitEnumNames ? '' : 'UNKNOWN');
|
AuthResult._(0, _omitEnumNames ? '' : 'AUTH_RESULT_UNSPECIFIED');
|
||||||
static const ClientConnectError_Code APPROVAL_DENIED =
|
static const AuthResult AUTH_RESULT_SUCCESS =
|
||||||
ClientConnectError_Code._(1, _omitEnumNames ? '' : 'APPROVAL_DENIED');
|
AuthResult._(1, _omitEnumNames ? '' : 'AUTH_RESULT_SUCCESS');
|
||||||
static const ClientConnectError_Code NO_USER_AGENTS_ONLINE =
|
static const AuthResult AUTH_RESULT_INVALID_KEY =
|
||||||
ClientConnectError_Code._(
|
AuthResult._(2, _omitEnumNames ? '' : 'AUTH_RESULT_INVALID_KEY');
|
||||||
2, _omitEnumNames ? '' : 'NO_USER_AGENTS_ONLINE');
|
static const AuthResult AUTH_RESULT_INVALID_SIGNATURE =
|
||||||
|
AuthResult._(3, _omitEnumNames ? '' : 'AUTH_RESULT_INVALID_SIGNATURE');
|
||||||
|
static const AuthResult AUTH_RESULT_APPROVAL_DENIED =
|
||||||
|
AuthResult._(4, _omitEnumNames ? '' : 'AUTH_RESULT_APPROVAL_DENIED');
|
||||||
|
static const AuthResult AUTH_RESULT_NO_USER_AGENTS_ONLINE = AuthResult._(
|
||||||
|
5, _omitEnumNames ? '' : 'AUTH_RESULT_NO_USER_AGENTS_ONLINE');
|
||||||
|
static const AuthResult AUTH_RESULT_INTERNAL =
|
||||||
|
AuthResult._(6, _omitEnumNames ? '' : 'AUTH_RESULT_INTERNAL');
|
||||||
|
|
||||||
static const $core.List<ClientConnectError_Code> values =
|
static const $core.List<AuthResult> values = <AuthResult>[
|
||||||
<ClientConnectError_Code>[
|
AUTH_RESULT_UNSPECIFIED,
|
||||||
UNKNOWN,
|
AUTH_RESULT_SUCCESS,
|
||||||
APPROVAL_DENIED,
|
AUTH_RESULT_INVALID_KEY,
|
||||||
NO_USER_AGENTS_ONLINE,
|
AUTH_RESULT_INVALID_SIGNATURE,
|
||||||
|
AUTH_RESULT_APPROVAL_DENIED,
|
||||||
|
AUTH_RESULT_NO_USER_AGENTS_ONLINE,
|
||||||
|
AUTH_RESULT_INTERNAL,
|
||||||
];
|
];
|
||||||
|
|
||||||
static final $core.List<ClientConnectError_Code?> _byValue =
|
static final $core.List<AuthResult?> _byValue =
|
||||||
$pb.ProtobufEnum.$_initByValueList(values, 2);
|
$pb.ProtobufEnum.$_initByValueList(values, 6);
|
||||||
static ClientConnectError_Code? valueOf($core.int value) =>
|
static AuthResult? valueOf($core.int value) =>
|
||||||
value < 0 || value >= _byValue.length ? null : _byValue[value];
|
value < 0 || value >= _byValue.length ? null : _byValue[value];
|
||||||
|
|
||||||
const ClientConnectError_Code._(super.value, super.name);
|
const AuthResult._(super.value, super.name);
|
||||||
|
}
|
||||||
|
|
||||||
|
class VaultState extends $pb.ProtobufEnum {
|
||||||
|
static const VaultState VAULT_STATE_UNSPECIFIED =
|
||||||
|
VaultState._(0, _omitEnumNames ? '' : 'VAULT_STATE_UNSPECIFIED');
|
||||||
|
static const VaultState VAULT_STATE_UNBOOTSTRAPPED =
|
||||||
|
VaultState._(1, _omitEnumNames ? '' : 'VAULT_STATE_UNBOOTSTRAPPED');
|
||||||
|
static const VaultState VAULT_STATE_SEALED =
|
||||||
|
VaultState._(2, _omitEnumNames ? '' : 'VAULT_STATE_SEALED');
|
||||||
|
static const VaultState VAULT_STATE_UNSEALED =
|
||||||
|
VaultState._(3, _omitEnumNames ? '' : 'VAULT_STATE_UNSEALED');
|
||||||
|
static const VaultState VAULT_STATE_ERROR =
|
||||||
|
VaultState._(4, _omitEnumNames ? '' : 'VAULT_STATE_ERROR');
|
||||||
|
|
||||||
|
static const $core.List<VaultState> values = <VaultState>[
|
||||||
|
VAULT_STATE_UNSPECIFIED,
|
||||||
|
VAULT_STATE_UNBOOTSTRAPPED,
|
||||||
|
VAULT_STATE_SEALED,
|
||||||
|
VAULT_STATE_UNSEALED,
|
||||||
|
VAULT_STATE_ERROR,
|
||||||
|
];
|
||||||
|
|
||||||
|
static final $core.List<VaultState?> _byValue =
|
||||||
|
$pb.ProtobufEnum.$_initByValueList(values, 4);
|
||||||
|
static VaultState? valueOf($core.int value) =>
|
||||||
|
value < 0 || value >= _byValue.length ? null : _byValue[value];
|
||||||
|
|
||||||
|
const VaultState._(super.value, super.name);
|
||||||
}
|
}
|
||||||
|
|
||||||
const $core.bool _omitEnumNames =
|
const $core.bool _omitEnumNames =
|
||||||
|
|||||||
@@ -15,6 +15,46 @@ import 'dart:convert' as $convert;
|
|||||||
import 'dart:core' as $core;
|
import 'dart:core' as $core;
|
||||||
import 'dart:typed_data' as $typed_data;
|
import 'dart:typed_data' as $typed_data;
|
||||||
|
|
||||||
|
@$core.Deprecated('Use authResultDescriptor instead')
|
||||||
|
const AuthResult$json = {
|
||||||
|
'1': 'AuthResult',
|
||||||
|
'2': [
|
||||||
|
{'1': 'AUTH_RESULT_UNSPECIFIED', '2': 0},
|
||||||
|
{'1': 'AUTH_RESULT_SUCCESS', '2': 1},
|
||||||
|
{'1': 'AUTH_RESULT_INVALID_KEY', '2': 2},
|
||||||
|
{'1': 'AUTH_RESULT_INVALID_SIGNATURE', '2': 3},
|
||||||
|
{'1': 'AUTH_RESULT_APPROVAL_DENIED', '2': 4},
|
||||||
|
{'1': 'AUTH_RESULT_NO_USER_AGENTS_ONLINE', '2': 5},
|
||||||
|
{'1': 'AUTH_RESULT_INTERNAL', '2': 6},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
/// Descriptor for `AuthResult`. Decode as a `google.protobuf.EnumDescriptorProto`.
|
||||||
|
final $typed_data.Uint8List authResultDescriptor = $convert.base64Decode(
|
||||||
|
'CgpBdXRoUmVzdWx0EhsKF0FVVEhfUkVTVUxUX1VOU1BFQ0lGSUVEEAASFwoTQVVUSF9SRVNVTF'
|
||||||
|
'RfU1VDQ0VTUxABEhsKF0FVVEhfUkVTVUxUX0lOVkFMSURfS0VZEAISIQodQVVUSF9SRVNVTFRf'
|
||||||
|
'SU5WQUxJRF9TSUdOQVRVUkUQAxIfChtBVVRIX1JFU1VMVF9BUFBST1ZBTF9ERU5JRUQQBBIlCi'
|
||||||
|
'FBVVRIX1JFU1VMVF9OT19VU0VSX0FHRU5UU19PTkxJTkUQBRIYChRBVVRIX1JFU1VMVF9JTlRF'
|
||||||
|
'Uk5BTBAG');
|
||||||
|
|
||||||
|
@$core.Deprecated('Use vaultStateDescriptor instead')
|
||||||
|
const VaultState$json = {
|
||||||
|
'1': 'VaultState',
|
||||||
|
'2': [
|
||||||
|
{'1': 'VAULT_STATE_UNSPECIFIED', '2': 0},
|
||||||
|
{'1': 'VAULT_STATE_UNBOOTSTRAPPED', '2': 1},
|
||||||
|
{'1': 'VAULT_STATE_SEALED', '2': 2},
|
||||||
|
{'1': 'VAULT_STATE_UNSEALED', '2': 3},
|
||||||
|
{'1': 'VAULT_STATE_ERROR', '2': 4},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
/// Descriptor for `VaultState`. Decode as a `google.protobuf.EnumDescriptorProto`.
|
||||||
|
final $typed_data.Uint8List vaultStateDescriptor = $convert.base64Decode(
|
||||||
|
'CgpWYXVsdFN0YXRlEhsKF1ZBVUxUX1NUQVRFX1VOU1BFQ0lGSUVEEAASHgoaVkFVTFRfU1RBVE'
|
||||||
|
'VfVU5CT09UU1RSQVBQRUQQARIWChJWQVVMVF9TVEFURV9TRUFMRUQQAhIYChRWQVVMVF9TVEFU'
|
||||||
|
'RV9VTlNFQUxFRBADEhUKEVZBVUxUX1NUQVRFX0VSUk9SEAQ=');
|
||||||
|
|
||||||
@$core.Deprecated('Use authChallengeRequestDescriptor instead')
|
@$core.Deprecated('Use authChallengeRequestDescriptor instead')
|
||||||
const AuthChallengeRequest$json = {
|
const AuthChallengeRequest$json = {
|
||||||
'1': 'AuthChallengeRequest',
|
'1': 'AuthChallengeRequest',
|
||||||
@@ -54,19 +94,11 @@ const AuthChallengeSolution$json = {
|
|||||||
final $typed_data.Uint8List authChallengeSolutionDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List authChallengeSolutionDescriptor = $convert.base64Decode(
|
||||||
'ChVBdXRoQ2hhbGxlbmdlU29sdXRpb24SHAoJc2lnbmF0dXJlGAEgASgMUglzaWduYXR1cmU=');
|
'ChVBdXRoQ2hhbGxlbmdlU29sdXRpb24SHAoJc2lnbmF0dXJlGAEgASgMUglzaWduYXR1cmU=');
|
||||||
|
|
||||||
@$core.Deprecated('Use authOkDescriptor instead')
|
|
||||||
const AuthOk$json = {
|
|
||||||
'1': 'AuthOk',
|
|
||||||
};
|
|
||||||
|
|
||||||
/// Descriptor for `AuthOk`. Decode as a `google.protobuf.DescriptorProto`.
|
|
||||||
final $typed_data.Uint8List authOkDescriptor =
|
|
||||||
$convert.base64Decode('CgZBdXRoT2s=');
|
|
||||||
|
|
||||||
@$core.Deprecated('Use clientRequestDescriptor instead')
|
@$core.Deprecated('Use clientRequestDescriptor instead')
|
||||||
const ClientRequest$json = {
|
const ClientRequest$json = {
|
||||||
'1': 'ClientRequest',
|
'1': 'ClientRequest',
|
||||||
'2': [
|
'2': [
|
||||||
|
{'1': 'request_id', '3': 4, '4': 1, '5': 5, '10': 'requestId'},
|
||||||
{
|
{
|
||||||
'1': 'auth_challenge_request',
|
'1': 'auth_challenge_request',
|
||||||
'3': 1,
|
'3': 1,
|
||||||
@@ -85,6 +117,15 @@ const ClientRequest$json = {
|
|||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'authChallengeSolution'
|
'10': 'authChallengeSolution'
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
'1': 'query_vault_state',
|
||||||
|
'3': 3,
|
||||||
|
'4': 1,
|
||||||
|
'5': 11,
|
||||||
|
'6': '.google.protobuf.Empty',
|
||||||
|
'9': 0,
|
||||||
|
'10': 'queryVaultState'
|
||||||
|
},
|
||||||
],
|
],
|
||||||
'8': [
|
'8': [
|
||||||
{'1': 'payload'},
|
{'1': 'payload'},
|
||||||
@@ -93,47 +134,26 @@ const ClientRequest$json = {
|
|||||||
|
|
||||||
/// Descriptor for `ClientRequest`. Decode as a `google.protobuf.DescriptorProto`.
|
/// Descriptor for `ClientRequest`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
final $typed_data.Uint8List clientRequestDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List clientRequestDescriptor = $convert.base64Decode(
|
||||||
'Cg1DbGllbnRSZXF1ZXN0ElwKFmF1dGhfY2hhbGxlbmdlX3JlcXVlc3QYASABKAsyJC5hcmJpdG'
|
'Cg1DbGllbnRSZXF1ZXN0Eh0KCnJlcXVlc3RfaWQYBCABKAVSCXJlcXVlc3RJZBJcChZhdXRoX2'
|
||||||
'VyLmNsaWVudC5BdXRoQ2hhbGxlbmdlUmVxdWVzdEgAUhRhdXRoQ2hhbGxlbmdlUmVxdWVzdBJf'
|
'NoYWxsZW5nZV9yZXF1ZXN0GAEgASgLMiQuYXJiaXRlci5jbGllbnQuQXV0aENoYWxsZW5nZVJl'
|
||||||
'ChdhdXRoX2NoYWxsZW5nZV9zb2x1dGlvbhgCIAEoCzIlLmFyYml0ZXIuY2xpZW50LkF1dGhDaG'
|
'cXVlc3RIAFIUYXV0aENoYWxsZW5nZVJlcXVlc3QSXwoXYXV0aF9jaGFsbGVuZ2Vfc29sdXRpb2'
|
||||||
'FsbGVuZ2VTb2x1dGlvbkgAUhVhdXRoQ2hhbGxlbmdlU29sdXRpb25CCQoHcGF5bG9hZA==');
|
'4YAiABKAsyJS5hcmJpdGVyLmNsaWVudC5BdXRoQ2hhbGxlbmdlU29sdXRpb25IAFIVYXV0aENo'
|
||||||
|
'YWxsZW5nZVNvbHV0aW9uEkQKEXF1ZXJ5X3ZhdWx0X3N0YXRlGAMgASgLMhYuZ29vZ2xlLnByb3'
|
||||||
@$core.Deprecated('Use clientConnectErrorDescriptor instead')
|
'RvYnVmLkVtcHR5SABSD3F1ZXJ5VmF1bHRTdGF0ZUIJCgdwYXlsb2Fk');
|
||||||
const ClientConnectError$json = {
|
|
||||||
'1': 'ClientConnectError',
|
|
||||||
'2': [
|
|
||||||
{
|
|
||||||
'1': 'code',
|
|
||||||
'3': 1,
|
|
||||||
'4': 1,
|
|
||||||
'5': 14,
|
|
||||||
'6': '.arbiter.client.ClientConnectError.Code',
|
|
||||||
'10': 'code'
|
|
||||||
},
|
|
||||||
],
|
|
||||||
'4': [ClientConnectError_Code$json],
|
|
||||||
};
|
|
||||||
|
|
||||||
@$core.Deprecated('Use clientConnectErrorDescriptor instead')
|
|
||||||
const ClientConnectError_Code$json = {
|
|
||||||
'1': 'Code',
|
|
||||||
'2': [
|
|
||||||
{'1': 'UNKNOWN', '2': 0},
|
|
||||||
{'1': 'APPROVAL_DENIED', '2': 1},
|
|
||||||
{'1': 'NO_USER_AGENTS_ONLINE', '2': 2},
|
|
||||||
],
|
|
||||||
};
|
|
||||||
|
|
||||||
/// Descriptor for `ClientConnectError`. Decode as a `google.protobuf.DescriptorProto`.
|
|
||||||
final $typed_data.Uint8List clientConnectErrorDescriptor = $convert.base64Decode(
|
|
||||||
'ChJDbGllbnRDb25uZWN0RXJyb3ISOwoEY29kZRgBIAEoDjInLmFyYml0ZXIuY2xpZW50LkNsaW'
|
|
||||||
'VudENvbm5lY3RFcnJvci5Db2RlUgRjb2RlIkMKBENvZGUSCwoHVU5LTk9XThAAEhMKD0FQUFJP'
|
|
||||||
'VkFMX0RFTklFRBABEhkKFU5PX1VTRVJfQUdFTlRTX09OTElORRAC');
|
|
||||||
|
|
||||||
@$core.Deprecated('Use clientResponseDescriptor instead')
|
@$core.Deprecated('Use clientResponseDescriptor instead')
|
||||||
const ClientResponse$json = {
|
const ClientResponse$json = {
|
||||||
'1': 'ClientResponse',
|
'1': 'ClientResponse',
|
||||||
'2': [
|
'2': [
|
||||||
|
{
|
||||||
|
'1': 'request_id',
|
||||||
|
'3': 7,
|
||||||
|
'4': 1,
|
||||||
|
'5': 5,
|
||||||
|
'9': 1,
|
||||||
|
'10': 'requestId',
|
||||||
|
'17': true
|
||||||
|
},
|
||||||
{
|
{
|
||||||
'1': 'auth_challenge',
|
'1': 'auth_challenge',
|
||||||
'3': 1,
|
'3': 1,
|
||||||
@@ -144,22 +164,13 @@ const ClientResponse$json = {
|
|||||||
'10': 'authChallenge'
|
'10': 'authChallenge'
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'1': 'auth_ok',
|
'1': 'auth_result',
|
||||||
'3': 2,
|
'3': 2,
|
||||||
'4': 1,
|
'4': 1,
|
||||||
'5': 11,
|
'5': 14,
|
||||||
'6': '.arbiter.client.AuthOk',
|
'6': '.arbiter.client.AuthResult',
|
||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'authOk'
|
'10': 'authResult'
|
||||||
},
|
|
||||||
{
|
|
||||||
'1': 'client_connect_error',
|
|
||||||
'3': 5,
|
|
||||||
'4': 1,
|
|
||||||
'5': 11,
|
|
||||||
'6': '.arbiter.client.ClientConnectError',
|
|
||||||
'9': 0,
|
|
||||||
'10': 'clientConnectError'
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'1': 'evm_sign_transaction',
|
'1': 'evm_sign_transaction',
|
||||||
@@ -179,19 +190,30 @@ const ClientResponse$json = {
|
|||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'evmAnalyzeTransaction'
|
'10': 'evmAnalyzeTransaction'
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
'1': 'vault_state',
|
||||||
|
'3': 6,
|
||||||
|
'4': 1,
|
||||||
|
'5': 14,
|
||||||
|
'6': '.arbiter.client.VaultState',
|
||||||
|
'9': 0,
|
||||||
|
'10': 'vaultState'
|
||||||
|
},
|
||||||
],
|
],
|
||||||
'8': [
|
'8': [
|
||||||
{'1': 'payload'},
|
{'1': 'payload'},
|
||||||
|
{'1': '_request_id'},
|
||||||
],
|
],
|
||||||
};
|
};
|
||||||
|
|
||||||
/// Descriptor for `ClientResponse`. Decode as a `google.protobuf.DescriptorProto`.
|
/// Descriptor for `ClientResponse`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
final $typed_data.Uint8List clientResponseDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List clientResponseDescriptor = $convert.base64Decode(
|
||||||
'Cg5DbGllbnRSZXNwb25zZRJGCg5hdXRoX2NoYWxsZW5nZRgBIAEoCzIdLmFyYml0ZXIuY2xpZW'
|
'Cg5DbGllbnRSZXNwb25zZRIiCgpyZXF1ZXN0X2lkGAcgASgFSAFSCXJlcXVlc3RJZIgBARJGCg'
|
||||||
'50LkF1dGhDaGFsbGVuZ2VIAFINYXV0aENoYWxsZW5nZRIxCgdhdXRoX29rGAIgASgLMhYuYXJi'
|
'5hdXRoX2NoYWxsZW5nZRgBIAEoCzIdLmFyYml0ZXIuY2xpZW50LkF1dGhDaGFsbGVuZ2VIAFIN'
|
||||||
'aXRlci5jbGllbnQuQXV0aE9rSABSBmF1dGhPaxJWChRjbGllbnRfY29ubmVjdF9lcnJvchgFIA'
|
'YXV0aENoYWxsZW5nZRI9CgthdXRoX3Jlc3VsdBgCIAEoDjIaLmFyYml0ZXIuY2xpZW50LkF1dG'
|
||||||
'EoCzIiLmFyYml0ZXIuY2xpZW50LkNsaWVudENvbm5lY3RFcnJvckgAUhJjbGllbnRDb25uZWN0'
|
'hSZXN1bHRIAFIKYXV0aFJlc3VsdBJbChRldm1fc2lnbl90cmFuc2FjdGlvbhgDIAEoCzInLmFy'
|
||||||
'RXJyb3ISWwoUZXZtX3NpZ25fdHJhbnNhY3Rpb24YAyABKAsyJy5hcmJpdGVyLmV2bS5Fdm1TaW'
|
'Yml0ZXIuZXZtLkV2bVNpZ25UcmFuc2FjdGlvblJlc3BvbnNlSABSEmV2bVNpZ25UcmFuc2FjdG'
|
||||||
'duVHJhbnNhY3Rpb25SZXNwb25zZUgAUhJldm1TaWduVHJhbnNhY3Rpb24SZAoXZXZtX2FuYWx5'
|
'lvbhJkChdldm1fYW5hbHl6ZV90cmFuc2FjdGlvbhgEIAEoCzIqLmFyYml0ZXIuZXZtLkV2bUFu'
|
||||||
'emVfdHJhbnNhY3Rpb24YBCABKAsyKi5hcmJpdGVyLmV2bS5Fdm1BbmFseXplVHJhbnNhY3Rpb2'
|
'YWx5emVUcmFuc2FjdGlvblJlc3BvbnNlSABSFWV2bUFuYWx5emVUcmFuc2FjdGlvbhI9Cgt2YX'
|
||||||
'5SZXNwb25zZUgAUhVldm1BbmFseXplVHJhbnNhY3Rpb25CCQoHcGF5bG9hZA==');
|
'VsdF9zdGF0ZRgGIAEoDjIaLmFyYml0ZXIuY2xpZW50LlZhdWx0U3RhdGVIAFIKdmF1bHRTdGF0'
|
||||||
|
'ZUIJCgdwYXlsb2FkQg0KC19yZXF1ZXN0X2lk');
|
||||||
|
|||||||
@@ -105,11 +105,9 @@ class AuthChallengeRequest extends $pb.GeneratedMessage {
|
|||||||
|
|
||||||
class AuthChallenge extends $pb.GeneratedMessage {
|
class AuthChallenge extends $pb.GeneratedMessage {
|
||||||
factory AuthChallenge({
|
factory AuthChallenge({
|
||||||
$core.List<$core.int>? pubkey,
|
|
||||||
$core.int? nonce,
|
$core.int? nonce,
|
||||||
}) {
|
}) {
|
||||||
final result = create();
|
final result = create();
|
||||||
if (pubkey != null) result.pubkey = pubkey;
|
|
||||||
if (nonce != null) result.nonce = nonce;
|
if (nonce != null) result.nonce = nonce;
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
@@ -128,8 +126,6 @@ class AuthChallenge extends $pb.GeneratedMessage {
|
|||||||
package:
|
package:
|
||||||
const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.user_agent'),
|
const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.user_agent'),
|
||||||
createEmptyInstance: create)
|
createEmptyInstance: create)
|
||||||
..a<$core.List<$core.int>>(
|
|
||||||
1, _omitFieldNames ? '' : 'pubkey', $pb.PbFieldType.OY)
|
|
||||||
..aI(2, _omitFieldNames ? '' : 'nonce')
|
..aI(2, _omitFieldNames ? '' : 'nonce')
|
||||||
..hasRequiredFields = false;
|
..hasRequiredFields = false;
|
||||||
|
|
||||||
@@ -152,21 +148,12 @@ class AuthChallenge extends $pb.GeneratedMessage {
|
|||||||
$pb.GeneratedMessage.$_defaultFor<AuthChallenge>(create);
|
$pb.GeneratedMessage.$_defaultFor<AuthChallenge>(create);
|
||||||
static AuthChallenge? _defaultInstance;
|
static AuthChallenge? _defaultInstance;
|
||||||
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
$core.List<$core.int> get pubkey => $_getN(0);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
set pubkey($core.List<$core.int> value) => $_setBytes(0, value);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
$core.bool hasPubkey() => $_has(0);
|
|
||||||
@$pb.TagNumber(1)
|
|
||||||
void clearPubkey() => $_clearField(1);
|
|
||||||
|
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
$core.int get nonce => $_getIZ(1);
|
$core.int get nonce => $_getIZ(0);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
set nonce($core.int value) => $_setSignedInt32(1, value);
|
set nonce($core.int value) => $_setSignedInt32(0, value);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
$core.bool hasNonce() => $_has(1);
|
$core.bool hasNonce() => $_has(0);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
void clearNonce() => $_clearField(2);
|
void clearNonce() => $_clearField(2);
|
||||||
}
|
}
|
||||||
@@ -228,44 +215,6 @@ class AuthChallengeSolution extends $pb.GeneratedMessage {
|
|||||||
void clearSignature() => $_clearField(1);
|
void clearSignature() => $_clearField(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
class AuthOk extends $pb.GeneratedMessage {
|
|
||||||
factory AuthOk() => create();
|
|
||||||
|
|
||||||
AuthOk._();
|
|
||||||
|
|
||||||
factory AuthOk.fromBuffer($core.List<$core.int> data,
|
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
|
||||||
create()..mergeFromBuffer(data, registry);
|
|
||||||
factory AuthOk.fromJson($core.String json,
|
|
||||||
[$pb.ExtensionRegistry registry = $pb.ExtensionRegistry.EMPTY]) =>
|
|
||||||
create()..mergeFromJson(json, registry);
|
|
||||||
|
|
||||||
static final $pb.BuilderInfo _i = $pb.BuilderInfo(
|
|
||||||
_omitMessageNames ? '' : 'AuthOk',
|
|
||||||
package:
|
|
||||||
const $pb.PackageName(_omitMessageNames ? '' : 'arbiter.user_agent'),
|
|
||||||
createEmptyInstance: create)
|
|
||||||
..hasRequiredFields = false;
|
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
AuthOk clone() => deepCopy();
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
|
||||||
AuthOk copyWith(void Function(AuthOk) updates) =>
|
|
||||||
super.copyWith((message) => updates(message as AuthOk)) as AuthOk;
|
|
||||||
|
|
||||||
@$core.override
|
|
||||||
$pb.BuilderInfo get info_ => _i;
|
|
||||||
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static AuthOk create() => AuthOk._();
|
|
||||||
@$core.override
|
|
||||||
AuthOk createEmptyInstance() => create();
|
|
||||||
@$core.pragma('dart2js:noInline')
|
|
||||||
static AuthOk getDefault() =>
|
|
||||||
_defaultInstance ??= $pb.GeneratedMessage.$_defaultFor<AuthOk>(create);
|
|
||||||
static AuthOk? _defaultInstance;
|
|
||||||
}
|
|
||||||
|
|
||||||
class UnsealStart extends $pb.GeneratedMessage {
|
class UnsealStart extends $pb.GeneratedMessage {
|
||||||
factory UnsealStart({
|
factory UnsealStart({
|
||||||
$core.List<$core.int>? clientPubkey,
|
$core.List<$core.int>? clientPubkey,
|
||||||
@@ -726,6 +675,7 @@ class UserAgentRequest extends $pb.GeneratedMessage {
|
|||||||
$1.EvmGrantListRequest? evmGrantList,
|
$1.EvmGrantListRequest? evmGrantList,
|
||||||
ClientConnectionResponse? clientConnectionResponse,
|
ClientConnectionResponse? clientConnectionResponse,
|
||||||
BootstrapEncryptedKey? bootstrapEncryptedKey,
|
BootstrapEncryptedKey? bootstrapEncryptedKey,
|
||||||
|
$core.int? id,
|
||||||
}) {
|
}) {
|
||||||
final result = create();
|
final result = create();
|
||||||
if (authChallengeRequest != null)
|
if (authChallengeRequest != null)
|
||||||
@@ -745,6 +695,7 @@ class UserAgentRequest extends $pb.GeneratedMessage {
|
|||||||
result.clientConnectionResponse = clientConnectionResponse;
|
result.clientConnectionResponse = clientConnectionResponse;
|
||||||
if (bootstrapEncryptedKey != null)
|
if (bootstrapEncryptedKey != null)
|
||||||
result.bootstrapEncryptedKey = bootstrapEncryptedKey;
|
result.bootstrapEncryptedKey = bootstrapEncryptedKey;
|
||||||
|
if (id != null) result.id = id;
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -807,6 +758,7 @@ class UserAgentRequest extends $pb.GeneratedMessage {
|
|||||||
..aOM<BootstrapEncryptedKey>(
|
..aOM<BootstrapEncryptedKey>(
|
||||||
12, _omitFieldNames ? '' : 'bootstrapEncryptedKey',
|
12, _omitFieldNames ? '' : 'bootstrapEncryptedKey',
|
||||||
subBuilder: BootstrapEncryptedKey.create)
|
subBuilder: BootstrapEncryptedKey.create)
|
||||||
|
..aI(14, _omitFieldNames ? '' : 'id')
|
||||||
..hasRequiredFields = false;
|
..hasRequiredFields = false;
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
||||||
@@ -990,11 +942,20 @@ class UserAgentRequest extends $pb.GeneratedMessage {
|
|||||||
void clearBootstrapEncryptedKey() => $_clearField(12);
|
void clearBootstrapEncryptedKey() => $_clearField(12);
|
||||||
@$pb.TagNumber(12)
|
@$pb.TagNumber(12)
|
||||||
BootstrapEncryptedKey ensureBootstrapEncryptedKey() => $_ensure(11);
|
BootstrapEncryptedKey ensureBootstrapEncryptedKey() => $_ensure(11);
|
||||||
|
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
$core.int get id => $_getIZ(12);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
set id($core.int value) => $_setSignedInt32(12, value);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
$core.bool hasId() => $_has(12);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
void clearId() => $_clearField(14);
|
||||||
}
|
}
|
||||||
|
|
||||||
enum UserAgentResponse_Payload {
|
enum UserAgentResponse_Payload {
|
||||||
authChallenge,
|
authChallenge,
|
||||||
authOk,
|
authResult,
|
||||||
unsealStartResponse,
|
unsealStartResponse,
|
||||||
unsealResult,
|
unsealResult,
|
||||||
vaultState,
|
vaultState,
|
||||||
@@ -1012,7 +973,7 @@ enum UserAgentResponse_Payload {
|
|||||||
class UserAgentResponse extends $pb.GeneratedMessage {
|
class UserAgentResponse extends $pb.GeneratedMessage {
|
||||||
factory UserAgentResponse({
|
factory UserAgentResponse({
|
||||||
AuthChallenge? authChallenge,
|
AuthChallenge? authChallenge,
|
||||||
AuthOk? authOk,
|
AuthResult? authResult,
|
||||||
UnsealStartResponse? unsealStartResponse,
|
UnsealStartResponse? unsealStartResponse,
|
||||||
UnsealResult? unsealResult,
|
UnsealResult? unsealResult,
|
||||||
VaultState? vaultState,
|
VaultState? vaultState,
|
||||||
@@ -1024,10 +985,11 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
ClientConnectionRequest? clientConnectionRequest,
|
ClientConnectionRequest? clientConnectionRequest,
|
||||||
ClientConnectionCancel? clientConnectionCancel,
|
ClientConnectionCancel? clientConnectionCancel,
|
||||||
BootstrapResult? bootstrapResult,
|
BootstrapResult? bootstrapResult,
|
||||||
|
$core.int? id,
|
||||||
}) {
|
}) {
|
||||||
final result = create();
|
final result = create();
|
||||||
if (authChallenge != null) result.authChallenge = authChallenge;
|
if (authChallenge != null) result.authChallenge = authChallenge;
|
||||||
if (authOk != null) result.authOk = authOk;
|
if (authResult != null) result.authResult = authResult;
|
||||||
if (unsealStartResponse != null)
|
if (unsealStartResponse != null)
|
||||||
result.unsealStartResponse = unsealStartResponse;
|
result.unsealStartResponse = unsealStartResponse;
|
||||||
if (unsealResult != null) result.unsealResult = unsealResult;
|
if (unsealResult != null) result.unsealResult = unsealResult;
|
||||||
@@ -1042,6 +1004,7 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
if (clientConnectionCancel != null)
|
if (clientConnectionCancel != null)
|
||||||
result.clientConnectionCancel = clientConnectionCancel;
|
result.clientConnectionCancel = clientConnectionCancel;
|
||||||
if (bootstrapResult != null) result.bootstrapResult = bootstrapResult;
|
if (bootstrapResult != null) result.bootstrapResult = bootstrapResult;
|
||||||
|
if (id != null) result.id = id;
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1057,7 +1020,7 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
static const $core.Map<$core.int, UserAgentResponse_Payload>
|
static const $core.Map<$core.int, UserAgentResponse_Payload>
|
||||||
_UserAgentResponse_PayloadByTag = {
|
_UserAgentResponse_PayloadByTag = {
|
||||||
1: UserAgentResponse_Payload.authChallenge,
|
1: UserAgentResponse_Payload.authChallenge,
|
||||||
2: UserAgentResponse_Payload.authOk,
|
2: UserAgentResponse_Payload.authResult,
|
||||||
3: UserAgentResponse_Payload.unsealStartResponse,
|
3: UserAgentResponse_Payload.unsealStartResponse,
|
||||||
4: UserAgentResponse_Payload.unsealResult,
|
4: UserAgentResponse_Payload.unsealResult,
|
||||||
5: UserAgentResponse_Payload.vaultState,
|
5: UserAgentResponse_Payload.vaultState,
|
||||||
@@ -1079,7 +1042,8 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
..oo(0, [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13])
|
..oo(0, [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13])
|
||||||
..aOM<AuthChallenge>(1, _omitFieldNames ? '' : 'authChallenge',
|
..aOM<AuthChallenge>(1, _omitFieldNames ? '' : 'authChallenge',
|
||||||
subBuilder: AuthChallenge.create)
|
subBuilder: AuthChallenge.create)
|
||||||
..aOM<AuthOk>(2, _omitFieldNames ? '' : 'authOk', subBuilder: AuthOk.create)
|
..aE<AuthResult>(2, _omitFieldNames ? '' : 'authResult',
|
||||||
|
enumValues: AuthResult.values)
|
||||||
..aOM<UnsealStartResponse>(3, _omitFieldNames ? '' : 'unsealStartResponse',
|
..aOM<UnsealStartResponse>(3, _omitFieldNames ? '' : 'unsealStartResponse',
|
||||||
subBuilder: UnsealStartResponse.create)
|
subBuilder: UnsealStartResponse.create)
|
||||||
..aE<UnsealResult>(4, _omitFieldNames ? '' : 'unsealResult',
|
..aE<UnsealResult>(4, _omitFieldNames ? '' : 'unsealResult',
|
||||||
@@ -1104,6 +1068,7 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
subBuilder: ClientConnectionCancel.create)
|
subBuilder: ClientConnectionCancel.create)
|
||||||
..aE<BootstrapResult>(13, _omitFieldNames ? '' : 'bootstrapResult',
|
..aE<BootstrapResult>(13, _omitFieldNames ? '' : 'bootstrapResult',
|
||||||
enumValues: BootstrapResult.values)
|
enumValues: BootstrapResult.values)
|
||||||
|
..aI(14, _omitFieldNames ? '' : 'id')
|
||||||
..hasRequiredFields = false;
|
..hasRequiredFields = false;
|
||||||
|
|
||||||
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
@$core.Deprecated('See https://github.com/google/protobuf.dart/issues/998.')
|
||||||
@@ -1167,15 +1132,13 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
AuthChallenge ensureAuthChallenge() => $_ensure(0);
|
AuthChallenge ensureAuthChallenge() => $_ensure(0);
|
||||||
|
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
AuthOk get authOk => $_getN(1);
|
AuthResult get authResult => $_getN(1);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
set authOk(AuthOk value) => $_setField(2, value);
|
set authResult(AuthResult value) => $_setField(2, value);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
$core.bool hasAuthOk() => $_has(1);
|
$core.bool hasAuthResult() => $_has(1);
|
||||||
@$pb.TagNumber(2)
|
@$pb.TagNumber(2)
|
||||||
void clearAuthOk() => $_clearField(2);
|
void clearAuthResult() => $_clearField(2);
|
||||||
@$pb.TagNumber(2)
|
|
||||||
AuthOk ensureAuthOk() => $_ensure(1);
|
|
||||||
|
|
||||||
@$pb.TagNumber(3)
|
@$pb.TagNumber(3)
|
||||||
UnsealStartResponse get unsealStartResponse => $_getN(2);
|
UnsealStartResponse get unsealStartResponse => $_getN(2);
|
||||||
@@ -1293,6 +1256,15 @@ class UserAgentResponse extends $pb.GeneratedMessage {
|
|||||||
$core.bool hasBootstrapResult() => $_has(12);
|
$core.bool hasBootstrapResult() => $_has(12);
|
||||||
@$pb.TagNumber(13)
|
@$pb.TagNumber(13)
|
||||||
void clearBootstrapResult() => $_clearField(13);
|
void clearBootstrapResult() => $_clearField(13);
|
||||||
|
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
$core.int get id => $_getIZ(13);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
set id($core.int value) => $_setSignedInt32(13, value);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
$core.bool hasId() => $_has(13);
|
||||||
|
@$pb.TagNumber(14)
|
||||||
|
void clearId() => $_clearField(14);
|
||||||
}
|
}
|
||||||
|
|
||||||
const $core.bool _omitFieldNames =
|
const $core.bool _omitFieldNames =
|
||||||
|
|||||||
@@ -39,6 +39,40 @@ class KeyType extends $pb.ProtobufEnum {
|
|||||||
const KeyType._(super.value, super.name);
|
const KeyType._(super.value, super.name);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
class AuthResult extends $pb.ProtobufEnum {
|
||||||
|
static const AuthResult AUTH_RESULT_UNSPECIFIED =
|
||||||
|
AuthResult._(0, _omitEnumNames ? '' : 'AUTH_RESULT_UNSPECIFIED');
|
||||||
|
static const AuthResult AUTH_RESULT_SUCCESS =
|
||||||
|
AuthResult._(1, _omitEnumNames ? '' : 'AUTH_RESULT_SUCCESS');
|
||||||
|
static const AuthResult AUTH_RESULT_INVALID_KEY =
|
||||||
|
AuthResult._(2, _omitEnumNames ? '' : 'AUTH_RESULT_INVALID_KEY');
|
||||||
|
static const AuthResult AUTH_RESULT_INVALID_SIGNATURE =
|
||||||
|
AuthResult._(3, _omitEnumNames ? '' : 'AUTH_RESULT_INVALID_SIGNATURE');
|
||||||
|
static const AuthResult AUTH_RESULT_BOOTSTRAP_REQUIRED =
|
||||||
|
AuthResult._(4, _omitEnumNames ? '' : 'AUTH_RESULT_BOOTSTRAP_REQUIRED');
|
||||||
|
static const AuthResult AUTH_RESULT_TOKEN_INVALID =
|
||||||
|
AuthResult._(5, _omitEnumNames ? '' : 'AUTH_RESULT_TOKEN_INVALID');
|
||||||
|
static const AuthResult AUTH_RESULT_INTERNAL =
|
||||||
|
AuthResult._(6, _omitEnumNames ? '' : 'AUTH_RESULT_INTERNAL');
|
||||||
|
|
||||||
|
static const $core.List<AuthResult> values = <AuthResult>[
|
||||||
|
AUTH_RESULT_UNSPECIFIED,
|
||||||
|
AUTH_RESULT_SUCCESS,
|
||||||
|
AUTH_RESULT_INVALID_KEY,
|
||||||
|
AUTH_RESULT_INVALID_SIGNATURE,
|
||||||
|
AUTH_RESULT_BOOTSTRAP_REQUIRED,
|
||||||
|
AUTH_RESULT_TOKEN_INVALID,
|
||||||
|
AUTH_RESULT_INTERNAL,
|
||||||
|
];
|
||||||
|
|
||||||
|
static final $core.List<AuthResult?> _byValue =
|
||||||
|
$pb.ProtobufEnum.$_initByValueList(values, 6);
|
||||||
|
static AuthResult? valueOf($core.int value) =>
|
||||||
|
value < 0 || value >= _byValue.length ? null : _byValue[value];
|
||||||
|
|
||||||
|
const AuthResult._(super.value, super.name);
|
||||||
|
}
|
||||||
|
|
||||||
class UnsealResult extends $pb.ProtobufEnum {
|
class UnsealResult extends $pb.ProtobufEnum {
|
||||||
static const UnsealResult UNSEAL_RESULT_UNSPECIFIED =
|
static const UnsealResult UNSEAL_RESULT_UNSPECIFIED =
|
||||||
UnsealResult._(0, _omitEnumNames ? '' : 'UNSEAL_RESULT_UNSPECIFIED');
|
UnsealResult._(0, _omitEnumNames ? '' : 'UNSEAL_RESULT_UNSPECIFIED');
|
||||||
@@ -65,14 +99,15 @@ class UnsealResult extends $pb.ProtobufEnum {
|
|||||||
}
|
}
|
||||||
|
|
||||||
class BootstrapResult extends $pb.ProtobufEnum {
|
class BootstrapResult extends $pb.ProtobufEnum {
|
||||||
static const BootstrapResult BOOTSTRAP_RESULT_UNSPECIFIED =
|
static const BootstrapResult BOOTSTRAP_RESULT_UNSPECIFIED = BootstrapResult._(
|
||||||
BootstrapResult._(0, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_UNSPECIFIED');
|
0, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_UNSPECIFIED');
|
||||||
static const BootstrapResult BOOTSTRAP_RESULT_SUCCESS =
|
static const BootstrapResult BOOTSTRAP_RESULT_SUCCESS =
|
||||||
BootstrapResult._(1, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_SUCCESS');
|
BootstrapResult._(1, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_SUCCESS');
|
||||||
static const BootstrapResult BOOTSTRAP_RESULT_ALREADY_BOOTSTRAPPED =
|
static const BootstrapResult BOOTSTRAP_RESULT_ALREADY_BOOTSTRAPPED =
|
||||||
BootstrapResult._(2, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_ALREADY_BOOTSTRAPPED');
|
BootstrapResult._(
|
||||||
static const BootstrapResult BOOTSTRAP_RESULT_INVALID_KEY =
|
2, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_ALREADY_BOOTSTRAPPED');
|
||||||
BootstrapResult._(3, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_INVALID_KEY');
|
static const BootstrapResult BOOTSTRAP_RESULT_INVALID_KEY = BootstrapResult._(
|
||||||
|
3, _omitEnumNames ? '' : 'BOOTSTRAP_RESULT_INVALID_KEY');
|
||||||
|
|
||||||
static const $core.List<BootstrapResult> values = <BootstrapResult>[
|
static const $core.List<BootstrapResult> values = <BootstrapResult>[
|
||||||
BOOTSTRAP_RESULT_UNSPECIFIED,
|
BOOTSTRAP_RESULT_UNSPECIFIED,
|
||||||
|
|||||||
@@ -31,6 +31,28 @@ final $typed_data.Uint8List keyTypeDescriptor = $convert.base64Decode(
|
|||||||
'CgdLZXlUeXBlEhgKFEtFWV9UWVBFX1VOU1BFQ0lGSUVEEAASFAoQS0VZX1RZUEVfRUQyNTUxOR'
|
'CgdLZXlUeXBlEhgKFEtFWV9UWVBFX1VOU1BFQ0lGSUVEEAASFAoQS0VZX1RZUEVfRUQyNTUxOR'
|
||||||
'ABEhwKGEtFWV9UWVBFX0VDRFNBX1NFQ1AyNTZLMRACEhAKDEtFWV9UWVBFX1JTQRAD');
|
'ABEhwKGEtFWV9UWVBFX0VDRFNBX1NFQ1AyNTZLMRACEhAKDEtFWV9UWVBFX1JTQRAD');
|
||||||
|
|
||||||
|
@$core.Deprecated('Use authResultDescriptor instead')
|
||||||
|
const AuthResult$json = {
|
||||||
|
'1': 'AuthResult',
|
||||||
|
'2': [
|
||||||
|
{'1': 'AUTH_RESULT_UNSPECIFIED', '2': 0},
|
||||||
|
{'1': 'AUTH_RESULT_SUCCESS', '2': 1},
|
||||||
|
{'1': 'AUTH_RESULT_INVALID_KEY', '2': 2},
|
||||||
|
{'1': 'AUTH_RESULT_INVALID_SIGNATURE', '2': 3},
|
||||||
|
{'1': 'AUTH_RESULT_BOOTSTRAP_REQUIRED', '2': 4},
|
||||||
|
{'1': 'AUTH_RESULT_TOKEN_INVALID', '2': 5},
|
||||||
|
{'1': 'AUTH_RESULT_INTERNAL', '2': 6},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
/// Descriptor for `AuthResult`. Decode as a `google.protobuf.EnumDescriptorProto`.
|
||||||
|
final $typed_data.Uint8List authResultDescriptor = $convert.base64Decode(
|
||||||
|
'CgpBdXRoUmVzdWx0EhsKF0FVVEhfUkVTVUxUX1VOU1BFQ0lGSUVEEAASFwoTQVVUSF9SRVNVTF'
|
||||||
|
'RfU1VDQ0VTUxABEhsKF0FVVEhfUkVTVUxUX0lOVkFMSURfS0VZEAISIQodQVVUSF9SRVNVTFRf'
|
||||||
|
'SU5WQUxJRF9TSUdOQVRVUkUQAxIiCh5BVVRIX1JFU1VMVF9CT09UU1RSQVBfUkVRVUlSRUQQBB'
|
||||||
|
'IdChlBVVRIX1JFU1VMVF9UT0tFTl9JTlZBTElEEAUSGAoUQVVUSF9SRVNVTFRfSU5URVJOQUwQ'
|
||||||
|
'Bg==');
|
||||||
|
|
||||||
@$core.Deprecated('Use unsealResultDescriptor instead')
|
@$core.Deprecated('Use unsealResultDescriptor instead')
|
||||||
const UnsealResult$json = {
|
const UnsealResult$json = {
|
||||||
'1': 'UnsealResult',
|
'1': 'UnsealResult',
|
||||||
@@ -48,6 +70,23 @@ final $typed_data.Uint8List unsealResultDescriptor = $convert.base64Decode(
|
|||||||
'9SRVNVTFRfU1VDQ0VTUxABEh0KGVVOU0VBTF9SRVNVTFRfSU5WQUxJRF9LRVkQAhIgChxVTlNF'
|
'9SRVNVTFRfU1VDQ0VTUxABEh0KGVVOU0VBTF9SRVNVTFRfSU5WQUxJRF9LRVkQAhIgChxVTlNF'
|
||||||
'QUxfUkVTVUxUX1VOQk9PVFNUUkFQUEVEEAM=');
|
'QUxfUkVTVUxUX1VOQk9PVFNUUkFQUEVEEAM=');
|
||||||
|
|
||||||
|
@$core.Deprecated('Use bootstrapResultDescriptor instead')
|
||||||
|
const BootstrapResult$json = {
|
||||||
|
'1': 'BootstrapResult',
|
||||||
|
'2': [
|
||||||
|
{'1': 'BOOTSTRAP_RESULT_UNSPECIFIED', '2': 0},
|
||||||
|
{'1': 'BOOTSTRAP_RESULT_SUCCESS', '2': 1},
|
||||||
|
{'1': 'BOOTSTRAP_RESULT_ALREADY_BOOTSTRAPPED', '2': 2},
|
||||||
|
{'1': 'BOOTSTRAP_RESULT_INVALID_KEY', '2': 3},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
/// Descriptor for `BootstrapResult`. Decode as a `google.protobuf.EnumDescriptorProto`.
|
||||||
|
final $typed_data.Uint8List bootstrapResultDescriptor = $convert.base64Decode(
|
||||||
|
'Cg9Cb290c3RyYXBSZXN1bHQSIAocQk9PVFNUUkFQX1JFU1VMVF9VTlNQRUNJRklFRBAAEhwKGE'
|
||||||
|
'JPT1RTVFJBUF9SRVNVTFRfU1VDQ0VTUxABEikKJUJPT1RTVFJBUF9SRVNVTFRfQUxSRUFEWV9C'
|
||||||
|
'T09UU1RSQVBQRUQQAhIgChxCT09UU1RSQVBfUkVTVUxUX0lOVkFMSURfS0VZEAM=');
|
||||||
|
|
||||||
@$core.Deprecated('Use vaultStateDescriptor instead')
|
@$core.Deprecated('Use vaultStateDescriptor instead')
|
||||||
const VaultState$json = {
|
const VaultState$json = {
|
||||||
'1': 'VaultState',
|
'1': 'VaultState',
|
||||||
@@ -105,15 +144,16 @@ final $typed_data.Uint8List authChallengeRequestDescriptor = $convert.base64Deco
|
|||||||
const AuthChallenge$json = {
|
const AuthChallenge$json = {
|
||||||
'1': 'AuthChallenge',
|
'1': 'AuthChallenge',
|
||||||
'2': [
|
'2': [
|
||||||
{'1': 'pubkey', '3': 1, '4': 1, '5': 12, '10': 'pubkey'},
|
|
||||||
{'1': 'nonce', '3': 2, '4': 1, '5': 5, '10': 'nonce'},
|
{'1': 'nonce', '3': 2, '4': 1, '5': 5, '10': 'nonce'},
|
||||||
],
|
],
|
||||||
|
'9': [
|
||||||
|
{'1': 1, '2': 2},
|
||||||
|
],
|
||||||
};
|
};
|
||||||
|
|
||||||
/// Descriptor for `AuthChallenge`. Decode as a `google.protobuf.DescriptorProto`.
|
/// Descriptor for `AuthChallenge`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
final $typed_data.Uint8List authChallengeDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List authChallengeDescriptor = $convert.base64Decode(
|
||||||
'Cg1BdXRoQ2hhbGxlbmdlEhYKBnB1YmtleRgBIAEoDFIGcHVia2V5EhQKBW5vbmNlGAIgASgFUg'
|
'Cg1BdXRoQ2hhbGxlbmdlEhQKBW5vbmNlGAIgASgFUgVub25jZUoECAEQAg==');
|
||||||
'Vub25jZQ==');
|
|
||||||
|
|
||||||
@$core.Deprecated('Use authChallengeSolutionDescriptor instead')
|
@$core.Deprecated('Use authChallengeSolutionDescriptor instead')
|
||||||
const AuthChallengeSolution$json = {
|
const AuthChallengeSolution$json = {
|
||||||
@@ -127,15 +167,6 @@ const AuthChallengeSolution$json = {
|
|||||||
final $typed_data.Uint8List authChallengeSolutionDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List authChallengeSolutionDescriptor = $convert.base64Decode(
|
||||||
'ChVBdXRoQ2hhbGxlbmdlU29sdXRpb24SHAoJc2lnbmF0dXJlGAEgASgMUglzaWduYXR1cmU=');
|
'ChVBdXRoQ2hhbGxlbmdlU29sdXRpb24SHAoJc2lnbmF0dXJlGAEgASgMUglzaWduYXR1cmU=');
|
||||||
|
|
||||||
@$core.Deprecated('Use authOkDescriptor instead')
|
|
||||||
const AuthOk$json = {
|
|
||||||
'1': 'AuthOk',
|
|
||||||
};
|
|
||||||
|
|
||||||
/// Descriptor for `AuthOk`. Decode as a `google.protobuf.DescriptorProto`.
|
|
||||||
final $typed_data.Uint8List authOkDescriptor =
|
|
||||||
$convert.base64Decode('CgZBdXRoT2s=');
|
|
||||||
|
|
||||||
@$core.Deprecated('Use unsealStartDescriptor instead')
|
@$core.Deprecated('Use unsealStartDescriptor instead')
|
||||||
const UnsealStart$json = {
|
const UnsealStart$json = {
|
||||||
'1': 'UnsealStart',
|
'1': 'UnsealStart',
|
||||||
@@ -177,6 +208,22 @@ final $typed_data.Uint8List unsealEncryptedKeyDescriptor = $convert.base64Decode
|
|||||||
'QYAiABKAxSCmNpcGhlcnRleHQSJwoPYXNzb2NpYXRlZF9kYXRhGAMgASgMUg5hc3NvY2lhdGVk'
|
'QYAiABKAxSCmNpcGhlcnRleHQSJwoPYXNzb2NpYXRlZF9kYXRhGAMgASgMUg5hc3NvY2lhdGVk'
|
||||||
'RGF0YQ==');
|
'RGF0YQ==');
|
||||||
|
|
||||||
|
@$core.Deprecated('Use bootstrapEncryptedKeyDescriptor instead')
|
||||||
|
const BootstrapEncryptedKey$json = {
|
||||||
|
'1': 'BootstrapEncryptedKey',
|
||||||
|
'2': [
|
||||||
|
{'1': 'nonce', '3': 1, '4': 1, '5': 12, '10': 'nonce'},
|
||||||
|
{'1': 'ciphertext', '3': 2, '4': 1, '5': 12, '10': 'ciphertext'},
|
||||||
|
{'1': 'associated_data', '3': 3, '4': 1, '5': 12, '10': 'associatedData'},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
/// Descriptor for `BootstrapEncryptedKey`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
|
final $typed_data.Uint8List bootstrapEncryptedKeyDescriptor = $convert.base64Decode(
|
||||||
|
'ChVCb290c3RyYXBFbmNyeXB0ZWRLZXkSFAoFbm9uY2UYASABKAxSBW5vbmNlEh4KCmNpcGhlcn'
|
||||||
|
'RleHQYAiABKAxSCmNpcGhlcnRleHQSJwoPYXNzb2NpYXRlZF9kYXRhGAMgASgMUg5hc3NvY2lh'
|
||||||
|
'dGVkRGF0YQ==');
|
||||||
|
|
||||||
@$core.Deprecated('Use clientConnectionRequestDescriptor instead')
|
@$core.Deprecated('Use clientConnectionRequestDescriptor instead')
|
||||||
const ClientConnectionRequest$json = {
|
const ClientConnectionRequest$json = {
|
||||||
'1': 'ClientConnectionRequest',
|
'1': 'ClientConnectionRequest',
|
||||||
@@ -216,6 +263,7 @@ final $typed_data.Uint8List clientConnectionCancelDescriptor =
|
|||||||
const UserAgentRequest$json = {
|
const UserAgentRequest$json = {
|
||||||
'1': 'UserAgentRequest',
|
'1': 'UserAgentRequest',
|
||||||
'2': [
|
'2': [
|
||||||
|
{'1': 'id', '3': 14, '4': 1, '5': 5, '10': 'id'},
|
||||||
{
|
{
|
||||||
'1': 'auth_challenge_request',
|
'1': 'auth_challenge_request',
|
||||||
'3': 1,
|
'3': 1,
|
||||||
@@ -315,6 +363,15 @@ const UserAgentRequest$json = {
|
|||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'clientConnectionResponse'
|
'10': 'clientConnectionResponse'
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
'1': 'bootstrap_encrypted_key',
|
||||||
|
'3': 12,
|
||||||
|
'4': 1,
|
||||||
|
'5': 11,
|
||||||
|
'6': '.arbiter.user_agent.BootstrapEncryptedKey',
|
||||||
|
'9': 0,
|
||||||
|
'10': 'bootstrapEncryptedKey'
|
||||||
|
},
|
||||||
],
|
],
|
||||||
'8': [
|
'8': [
|
||||||
{'1': 'payload'},
|
{'1': 'payload'},
|
||||||
@@ -323,28 +380,32 @@ const UserAgentRequest$json = {
|
|||||||
|
|
||||||
/// Descriptor for `UserAgentRequest`. Decode as a `google.protobuf.DescriptorProto`.
|
/// Descriptor for `UserAgentRequest`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
final $typed_data.Uint8List userAgentRequestDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List userAgentRequestDescriptor = $convert.base64Decode(
|
||||||
'ChBVc2VyQWdlbnRSZXF1ZXN0EmAKFmF1dGhfY2hhbGxlbmdlX3JlcXVlc3QYASABKAsyKC5hcm'
|
'ChBVc2VyQWdlbnRSZXF1ZXN0Eg4KAmlkGA4gASgFUgJpZBJgChZhdXRoX2NoYWxsZW5nZV9yZX'
|
||||||
'JpdGVyLnVzZXJfYWdlbnQuQXV0aENoYWxsZW5nZVJlcXVlc3RIAFIUYXV0aENoYWxsZW5nZVJl'
|
'F1ZXN0GAEgASgLMiguYXJiaXRlci51c2VyX2FnZW50LkF1dGhDaGFsbGVuZ2VSZXF1ZXN0SABS'
|
||||||
'cXVlc3QSYwoXYXV0aF9jaGFsbGVuZ2Vfc29sdXRpb24YAiABKAsyKS5hcmJpdGVyLnVzZXJfYW'
|
'FGF1dGhDaGFsbGVuZ2VSZXF1ZXN0EmMKF2F1dGhfY2hhbGxlbmdlX3NvbHV0aW9uGAIgASgLMi'
|
||||||
'dlbnQuQXV0aENoYWxsZW5nZVNvbHV0aW9uSABSFWF1dGhDaGFsbGVuZ2VTb2x1dGlvbhJECgx1'
|
'kuYXJiaXRlci51c2VyX2FnZW50LkF1dGhDaGFsbGVuZ2VTb2x1dGlvbkgAUhVhdXRoQ2hhbGxl'
|
||||||
'bnNlYWxfc3RhcnQYAyABKAsyHy5hcmJpdGVyLnVzZXJfYWdlbnQuVW5zZWFsU3RhcnRIAFILdW'
|
'bmdlU29sdXRpb24SRAoMdW5zZWFsX3N0YXJ0GAMgASgLMh8uYXJiaXRlci51c2VyX2FnZW50Ll'
|
||||||
'5zZWFsU3RhcnQSWgoUdW5zZWFsX2VuY3J5cHRlZF9rZXkYBCABKAsyJi5hcmJpdGVyLnVzZXJf'
|
'Vuc2VhbFN0YXJ0SABSC3Vuc2VhbFN0YXJ0EloKFHVuc2VhbF9lbmNyeXB0ZWRfa2V5GAQgASgL'
|
||||||
'YWdlbnQuVW5zZWFsRW5jcnlwdGVkS2V5SABSEnVuc2VhbEVuY3J5cHRlZEtleRJEChFxdWVyeV'
|
'MiYuYXJiaXRlci51c2VyX2FnZW50LlVuc2VhbEVuY3J5cHRlZEtleUgAUhJ1bnNlYWxFbmNyeX'
|
||||||
'92YXVsdF9zdGF0ZRgFIAEoCzIWLmdvb2dsZS5wcm90b2J1Zi5FbXB0eUgAUg9xdWVyeVZhdWx0'
|
'B0ZWRLZXkSRAoRcXVlcnlfdmF1bHRfc3RhdGUYBSABKAsyFi5nb29nbGUucHJvdG9idWYuRW1w'
|
||||||
'U3RhdGUSRAoRZXZtX3dhbGxldF9jcmVhdGUYBiABKAsyFi5nb29nbGUucHJvdG9idWYuRW1wdH'
|
'dHlIAFIPcXVlcnlWYXVsdFN0YXRlEkQKEWV2bV93YWxsZXRfY3JlYXRlGAYgASgLMhYuZ29vZ2'
|
||||||
'lIAFIPZXZtV2FsbGV0Q3JlYXRlEkAKD2V2bV93YWxsZXRfbGlzdBgHIAEoCzIWLmdvb2dsZS5w'
|
'xlLnByb3RvYnVmLkVtcHR5SABSD2V2bVdhbGxldENyZWF0ZRJACg9ldm1fd2FsbGV0X2xpc3QY'
|
||||||
'cm90b2J1Zi5FbXB0eUgAUg1ldm1XYWxsZXRMaXN0Ek4KEGV2bV9ncmFudF9jcmVhdGUYCCABKA'
|
'ByABKAsyFi5nb29nbGUucHJvdG9idWYuRW1wdHlIAFINZXZtV2FsbGV0TGlzdBJOChBldm1fZ3'
|
||||||
'syIi5hcmJpdGVyLmV2bS5Fdm1HcmFudENyZWF0ZVJlcXVlc3RIAFIOZXZtR3JhbnRDcmVhdGUS'
|
'JhbnRfY3JlYXRlGAggASgLMiIuYXJiaXRlci5ldm0uRXZtR3JhbnRDcmVhdGVSZXF1ZXN0SABS'
|
||||||
'TgoQZXZtX2dyYW50X2RlbGV0ZRgJIAEoCzIiLmFyYml0ZXIuZXZtLkV2bUdyYW50RGVsZXRlUm'
|
'DmV2bUdyYW50Q3JlYXRlEk4KEGV2bV9ncmFudF9kZWxldGUYCSABKAsyIi5hcmJpdGVyLmV2bS'
|
||||||
'VxdWVzdEgAUg5ldm1HcmFudERlbGV0ZRJICg5ldm1fZ3JhbnRfbGlzdBgKIAEoCzIgLmFyYml0'
|
'5Fdm1HcmFudERlbGV0ZVJlcXVlc3RIAFIOZXZtR3JhbnREZWxldGUSSAoOZXZtX2dyYW50X2xp'
|
||||||
'ZXIuZXZtLkV2bUdyYW50TGlzdFJlcXVlc3RIAFIMZXZtR3JhbnRMaXN0EmwKGmNsaWVudF9jb2'
|
'c3QYCiABKAsyIC5hcmJpdGVyLmV2bS5Fdm1HcmFudExpc3RSZXF1ZXN0SABSDGV2bUdyYW50TG'
|
||||||
'5uZWN0aW9uX3Jlc3BvbnNlGAsgASgLMiwuYXJiaXRlci51c2VyX2FnZW50LkNsaWVudENvbm5l'
|
'lzdBJsChpjbGllbnRfY29ubmVjdGlvbl9yZXNwb25zZRgLIAEoCzIsLmFyYml0ZXIudXNlcl9h'
|
||||||
'Y3Rpb25SZXNwb25zZUgAUhhjbGllbnRDb25uZWN0aW9uUmVzcG9uc2VCCQoHcGF5bG9hZA==');
|
'Z2VudC5DbGllbnRDb25uZWN0aW9uUmVzcG9uc2VIAFIYY2xpZW50Q29ubmVjdGlvblJlc3Bvbn'
|
||||||
|
'NlEmMKF2Jvb3RzdHJhcF9lbmNyeXB0ZWRfa2V5GAwgASgLMikuYXJiaXRlci51c2VyX2FnZW50'
|
||||||
|
'LkJvb3RzdHJhcEVuY3J5cHRlZEtleUgAUhVib290c3RyYXBFbmNyeXB0ZWRLZXlCCQoHcGF5bG'
|
||||||
|
'9hZA==');
|
||||||
|
|
||||||
@$core.Deprecated('Use userAgentResponseDescriptor instead')
|
@$core.Deprecated('Use userAgentResponseDescriptor instead')
|
||||||
const UserAgentResponse$json = {
|
const UserAgentResponse$json = {
|
||||||
'1': 'UserAgentResponse',
|
'1': 'UserAgentResponse',
|
||||||
'2': [
|
'2': [
|
||||||
|
{'1': 'id', '3': 14, '4': 1, '5': 5, '9': 1, '10': 'id', '17': true},
|
||||||
{
|
{
|
||||||
'1': 'auth_challenge',
|
'1': 'auth_challenge',
|
||||||
'3': 1,
|
'3': 1,
|
||||||
@@ -355,13 +416,13 @@ const UserAgentResponse$json = {
|
|||||||
'10': 'authChallenge'
|
'10': 'authChallenge'
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'1': 'auth_ok',
|
'1': 'auth_result',
|
||||||
'3': 2,
|
'3': 2,
|
||||||
'4': 1,
|
'4': 1,
|
||||||
'5': 11,
|
'5': 14,
|
||||||
'6': '.arbiter.user_agent.AuthOk',
|
'6': '.arbiter.user_agent.AuthResult',
|
||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'authOk'
|
'10': 'authResult'
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'1': 'unseal_start_response',
|
'1': 'unseal_start_response',
|
||||||
@@ -453,30 +514,42 @@ const UserAgentResponse$json = {
|
|||||||
'9': 0,
|
'9': 0,
|
||||||
'10': 'clientConnectionCancel'
|
'10': 'clientConnectionCancel'
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
'1': 'bootstrap_result',
|
||||||
|
'3': 13,
|
||||||
|
'4': 1,
|
||||||
|
'5': 14,
|
||||||
|
'6': '.arbiter.user_agent.BootstrapResult',
|
||||||
|
'9': 0,
|
||||||
|
'10': 'bootstrapResult'
|
||||||
|
},
|
||||||
],
|
],
|
||||||
'8': [
|
'8': [
|
||||||
{'1': 'payload'},
|
{'1': 'payload'},
|
||||||
|
{'1': '_id'},
|
||||||
],
|
],
|
||||||
};
|
};
|
||||||
|
|
||||||
/// Descriptor for `UserAgentResponse`. Decode as a `google.protobuf.DescriptorProto`.
|
/// Descriptor for `UserAgentResponse`. Decode as a `google.protobuf.DescriptorProto`.
|
||||||
final $typed_data.Uint8List userAgentResponseDescriptor = $convert.base64Decode(
|
final $typed_data.Uint8List userAgentResponseDescriptor = $convert.base64Decode(
|
||||||
'ChFVc2VyQWdlbnRSZXNwb25zZRJKCg5hdXRoX2NoYWxsZW5nZRgBIAEoCzIhLmFyYml0ZXIudX'
|
'ChFVc2VyQWdlbnRSZXNwb25zZRITCgJpZBgOIAEoBUgBUgJpZIgBARJKCg5hdXRoX2NoYWxsZW'
|
||||||
'Nlcl9hZ2VudC5BdXRoQ2hhbGxlbmdlSABSDWF1dGhDaGFsbGVuZ2USNQoHYXV0aF9vaxgCIAEo'
|
'5nZRgBIAEoCzIhLmFyYml0ZXIudXNlcl9hZ2VudC5BdXRoQ2hhbGxlbmdlSABSDWF1dGhDaGFs'
|
||||||
'CzIaLmFyYml0ZXIudXNlcl9hZ2VudC5BdXRoT2tIAFIGYXV0aE9rEl0KFXVuc2VhbF9zdGFydF'
|
'bGVuZ2USQQoLYXV0aF9yZXN1bHQYAiABKA4yHi5hcmJpdGVyLnVzZXJfYWdlbnQuQXV0aFJlc3'
|
||||||
'9yZXNwb25zZRgDIAEoCzInLmFyYml0ZXIudXNlcl9hZ2VudC5VbnNlYWxTdGFydFJlc3BvbnNl'
|
'VsdEgAUgphdXRoUmVzdWx0El0KFXVuc2VhbF9zdGFydF9yZXNwb25zZRgDIAEoCzInLmFyYml0'
|
||||||
'SABSE3Vuc2VhbFN0YXJ0UmVzcG9uc2USRwoNdW5zZWFsX3Jlc3VsdBgEIAEoDjIgLmFyYml0ZX'
|
'ZXIudXNlcl9hZ2VudC5VbnNlYWxTdGFydFJlc3BvbnNlSABSE3Vuc2VhbFN0YXJ0UmVzcG9uc2'
|
||||||
'IudXNlcl9hZ2VudC5VbnNlYWxSZXN1bHRIAFIMdW5zZWFsUmVzdWx0EkEKC3ZhdWx0X3N0YXRl'
|
'USRwoNdW5zZWFsX3Jlc3VsdBgEIAEoDjIgLmFyYml0ZXIudXNlcl9hZ2VudC5VbnNlYWxSZXN1'
|
||||||
'GAUgASgOMh4uYXJiaXRlci51c2VyX2FnZW50LlZhdWx0U3RhdGVIAFIKdmF1bHRTdGF0ZRJPCh'
|
'bHRIAFIMdW5zZWFsUmVzdWx0EkEKC3ZhdWx0X3N0YXRlGAUgASgOMh4uYXJiaXRlci51c2VyX2'
|
||||||
'Fldm1fd2FsbGV0X2NyZWF0ZRgGIAEoCzIhLmFyYml0ZXIuZXZtLldhbGxldENyZWF0ZVJlc3Bv'
|
'FnZW50LlZhdWx0U3RhdGVIAFIKdmF1bHRTdGF0ZRJPChFldm1fd2FsbGV0X2NyZWF0ZRgGIAEo'
|
||||||
'bnNlSABSD2V2bVdhbGxldENyZWF0ZRJJCg9ldm1fd2FsbGV0X2xpc3QYByABKAsyHy5hcmJpdG'
|
'CzIhLmFyYml0ZXIuZXZtLldhbGxldENyZWF0ZVJlc3BvbnNlSABSD2V2bVdhbGxldENyZWF0ZR'
|
||||||
'VyLmV2bS5XYWxsZXRMaXN0UmVzcG9uc2VIAFINZXZtV2FsbGV0TGlzdBJPChBldm1fZ3JhbnRf'
|
'JJCg9ldm1fd2FsbGV0X2xpc3QYByABKAsyHy5hcmJpdGVyLmV2bS5XYWxsZXRMaXN0UmVzcG9u'
|
||||||
'Y3JlYXRlGAggASgLMiMuYXJiaXRlci5ldm0uRXZtR3JhbnRDcmVhdGVSZXNwb25zZUgAUg5ldm'
|
'c2VIAFINZXZtV2FsbGV0TGlzdBJPChBldm1fZ3JhbnRfY3JlYXRlGAggASgLMiMuYXJiaXRlci'
|
||||||
'1HcmFudENyZWF0ZRJPChBldm1fZ3JhbnRfZGVsZXRlGAkgASgLMiMuYXJiaXRlci5ldm0uRXZt'
|
'5ldm0uRXZtR3JhbnRDcmVhdGVSZXNwb25zZUgAUg5ldm1HcmFudENyZWF0ZRJPChBldm1fZ3Jh'
|
||||||
'R3JhbnREZWxldGVSZXNwb25zZUgAUg5ldm1HcmFudERlbGV0ZRJJCg5ldm1fZ3JhbnRfbGlzdB'
|
'bnRfZGVsZXRlGAkgASgLMiMuYXJiaXRlci5ldm0uRXZtR3JhbnREZWxldGVSZXNwb25zZUgAUg'
|
||||||
'gKIAEoCzIhLmFyYml0ZXIuZXZtLkV2bUdyYW50TGlzdFJlc3BvbnNlSABSDGV2bUdyYW50TGlz'
|
'5ldm1HcmFudERlbGV0ZRJJCg5ldm1fZ3JhbnRfbGlzdBgKIAEoCzIhLmFyYml0ZXIuZXZtLkV2'
|
||||||
'dBJpChljbGllbnRfY29ubmVjdGlvbl9yZXF1ZXN0GAsgASgLMisuYXJiaXRlci51c2VyX2FnZW'
|
'bUdyYW50TGlzdFJlc3BvbnNlSABSDGV2bUdyYW50TGlzdBJpChljbGllbnRfY29ubmVjdGlvbl'
|
||||||
'50LkNsaWVudENvbm5lY3Rpb25SZXF1ZXN0SABSF2NsaWVudENvbm5lY3Rpb25SZXF1ZXN0EmYK'
|
'9yZXF1ZXN0GAsgASgLMisuYXJiaXRlci51c2VyX2FnZW50LkNsaWVudENvbm5lY3Rpb25SZXF1'
|
||||||
'GGNsaWVudF9jb25uZWN0aW9uX2NhbmNlbBgMIAEoCzIqLmFyYml0ZXIudXNlcl9hZ2VudC5DbG'
|
'ZXN0SABSF2NsaWVudENvbm5lY3Rpb25SZXF1ZXN0EmYKGGNsaWVudF9jb25uZWN0aW9uX2Nhbm'
|
||||||
'llbnRDb25uZWN0aW9uQ2FuY2VsSABSFmNsaWVudENvbm5lY3Rpb25DYW5jZWxCCQoHcGF5bG9h'
|
'NlbBgMIAEoCzIqLmFyYml0ZXIudXNlcl9hZ2VudC5DbGllbnRDb25uZWN0aW9uQ2FuY2VsSABS'
|
||||||
'ZA==');
|
'FmNsaWVudENvbm5lY3Rpb25DYW5jZWwSUAoQYm9vdHN0cmFwX3Jlc3VsdBgNIAEoDjIjLmFyYm'
|
||||||
|
'l0ZXIudXNlcl9hZ2VudC5Cb290c3RyYXBSZXN1bHRIAFIPYm9vdHN0cmFwUmVzdWx0QgkKB3Bh'
|
||||||
|
'eWxvYWRCBQoDX2lk');
|
||||||
|
|||||||
@@ -13,9 +13,7 @@ Future<VaultState?> vaultState(Ref ref) async {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
await conn.send(UserAgentRequest(queryVaultState: Empty()));
|
final resp = await conn.request(UserAgentRequest(queryVaultState: Empty()));
|
||||||
|
|
||||||
final resp = await conn.receive();
|
|
||||||
if (resp.whichPayload() != UserAgentResponse_Payload.vaultState) {
|
if (resp.whichPayload() != UserAgentResponse_Payload.vaultState) {
|
||||||
talker.warning('Expected vault state response, got ${resp.whichPayload()}');
|
talker.warning('Expected vault state response, got ${resp.whichPayload()}');
|
||||||
return null;
|
return null;
|
||||||
|
|||||||
@@ -46,4 +46,4 @@ final class VaultStateProvider
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
String _$vaultStateHash() => r'1fd975a9661de1f62beef9eb1c7c439f377a8b88';
|
String _$vaultStateHash() => r'97085e49bc3a296e36fa6c04a8f4c9abafac0835';
|
||||||
|
|||||||
Reference in New Issue
Block a user