wormhole/node/pkg/proto/node/v1/node_grpc.pb.go

466 lines
23 KiB
Go

// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
package nodev1
import (
context "context"
grpc "google.golang.org/grpc"
codes "google.golang.org/grpc/codes"
status "google.golang.org/grpc/status"
)
// This is a compile-time assertion to ensure that this generated file
// is compatible with the grpc package it is being compiled against.
// Requires gRPC-Go v1.32.0 or later.
const _ = grpc.SupportPackageIsVersion7
// NodePrivilegedServiceClient is the client API for NodePrivilegedService service.
//
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
type NodePrivilegedServiceClient interface {
// InjectGovernanceVAA injects a governance VAA into the guardian node.
// The node will inject the VAA into the aggregator and sign/broadcast the VAA signature.
//
// A consensus majority of nodes on the network will have to inject the VAA within the
// VAA timeout window for it to reach consensus.
InjectGovernanceVAA(ctx context.Context, in *InjectGovernanceVAARequest, opts ...grpc.CallOption) (*InjectGovernanceVAAResponse, error)
// FindMissingMessages will detect message sequence gaps in the local VAA store for a
// specific emitter chain and address. Start and end slots are the lowest and highest
// sequence numbers available in the local store, respectively.
//
// An error is returned if more than 1000 gaps are found.
FindMissingMessages(ctx context.Context, in *FindMissingMessagesRequest, opts ...grpc.CallOption) (*FindMissingMessagesResponse, error)
// SendObservationRequest broadcasts a signed observation request to the gossip network
// using the node's guardian key. The network rate limits these requests to one per second.
// Requests at higher rates will fail silently.
SendObservationRequest(ctx context.Context, in *SendObservationRequestRequest, opts ...grpc.CallOption) (*SendObservationRequestResponse, error)
// ChainGovernorStatus displays the status of the chain governor.
ChainGovernorStatus(ctx context.Context, in *ChainGovernorStatusRequest, opts ...grpc.CallOption) (*ChainGovernorStatusResponse, error)
// ChainGovernorReload clears the chain governor history and reloads it from the database.
ChainGovernorReload(ctx context.Context, in *ChainGovernorReloadRequest, opts ...grpc.CallOption) (*ChainGovernorReloadResponse, error)
// ChainGovernorDropPendingVAA drops a VAA from the chain governor pending list.
ChainGovernorDropPendingVAA(ctx context.Context, in *ChainGovernorDropPendingVAARequest, opts ...grpc.CallOption) (*ChainGovernorDropPendingVAAResponse, error)
// ChainGovernorReleasePendingVAA release a VAA from the chain governor pending list, publishing it immediately.
ChainGovernorReleasePendingVAA(ctx context.Context, in *ChainGovernorReleasePendingVAARequest, opts ...grpc.CallOption) (*ChainGovernorReleasePendingVAAResponse, error)
// ChainGovernorResetReleaseTimer resets the release timer for a chain governor pending VAA to the configured maximum.
ChainGovernorResetReleaseTimer(ctx context.Context, in *ChainGovernorResetReleaseTimerRequest, opts ...grpc.CallOption) (*ChainGovernorResetReleaseTimerResponse, error)
// PurgePythNetVaas deletes PythNet VAAs from the database that are more than the specified number of days old.
PurgePythNetVaas(ctx context.Context, in *PurgePythNetVaasRequest, opts ...grpc.CallOption) (*PurgePythNetVaasResponse, error)
// SignExistingVAA signs an existing VAA for a new guardian set using the local guardian key.
SignExistingVAA(ctx context.Context, in *SignExistingVAARequest, opts ...grpc.CallOption) (*SignExistingVAAResponse, error)
}
type nodePrivilegedServiceClient struct {
cc grpc.ClientConnInterface
}
func NewNodePrivilegedServiceClient(cc grpc.ClientConnInterface) NodePrivilegedServiceClient {
return &nodePrivilegedServiceClient{cc}
}
func (c *nodePrivilegedServiceClient) InjectGovernanceVAA(ctx context.Context, in *InjectGovernanceVAARequest, opts ...grpc.CallOption) (*InjectGovernanceVAAResponse, error) {
out := new(InjectGovernanceVAAResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/InjectGovernanceVAA", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) FindMissingMessages(ctx context.Context, in *FindMissingMessagesRequest, opts ...grpc.CallOption) (*FindMissingMessagesResponse, error) {
out := new(FindMissingMessagesResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/FindMissingMessages", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) SendObservationRequest(ctx context.Context, in *SendObservationRequestRequest, opts ...grpc.CallOption) (*SendObservationRequestResponse, error) {
out := new(SendObservationRequestResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/SendObservationRequest", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) ChainGovernorStatus(ctx context.Context, in *ChainGovernorStatusRequest, opts ...grpc.CallOption) (*ChainGovernorStatusResponse, error) {
out := new(ChainGovernorStatusResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/ChainGovernorStatus", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) ChainGovernorReload(ctx context.Context, in *ChainGovernorReloadRequest, opts ...grpc.CallOption) (*ChainGovernorReloadResponse, error) {
out := new(ChainGovernorReloadResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/ChainGovernorReload", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) ChainGovernorDropPendingVAA(ctx context.Context, in *ChainGovernorDropPendingVAARequest, opts ...grpc.CallOption) (*ChainGovernorDropPendingVAAResponse, error) {
out := new(ChainGovernorDropPendingVAAResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) ChainGovernorReleasePendingVAA(ctx context.Context, in *ChainGovernorReleasePendingVAARequest, opts ...grpc.CallOption) (*ChainGovernorReleasePendingVAAResponse, error) {
out := new(ChainGovernorReleasePendingVAAResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) ChainGovernorResetReleaseTimer(ctx context.Context, in *ChainGovernorResetReleaseTimerRequest, opts ...grpc.CallOption) (*ChainGovernorResetReleaseTimerResponse, error) {
out := new(ChainGovernorResetReleaseTimerResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) PurgePythNetVaas(ctx context.Context, in *PurgePythNetVaasRequest, opts ...grpc.CallOption) (*PurgePythNetVaasResponse, error) {
out := new(PurgePythNetVaasResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/PurgePythNetVaas", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *nodePrivilegedServiceClient) SignExistingVAA(ctx context.Context, in *SignExistingVAARequest, opts ...grpc.CallOption) (*SignExistingVAAResponse, error) {
out := new(SignExistingVAAResponse)
err := c.cc.Invoke(ctx, "/node.v1.NodePrivilegedService/SignExistingVAA", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
// NodePrivilegedServiceServer is the server API for NodePrivilegedService service.
// All implementations must embed UnimplementedNodePrivilegedServiceServer
// for forward compatibility
type NodePrivilegedServiceServer interface {
// InjectGovernanceVAA injects a governance VAA into the guardian node.
// The node will inject the VAA into the aggregator and sign/broadcast the VAA signature.
//
// A consensus majority of nodes on the network will have to inject the VAA within the
// VAA timeout window for it to reach consensus.
InjectGovernanceVAA(context.Context, *InjectGovernanceVAARequest) (*InjectGovernanceVAAResponse, error)
// FindMissingMessages will detect message sequence gaps in the local VAA store for a
// specific emitter chain and address. Start and end slots are the lowest and highest
// sequence numbers available in the local store, respectively.
//
// An error is returned if more than 1000 gaps are found.
FindMissingMessages(context.Context, *FindMissingMessagesRequest) (*FindMissingMessagesResponse, error)
// SendObservationRequest broadcasts a signed observation request to the gossip network
// using the node's guardian key. The network rate limits these requests to one per second.
// Requests at higher rates will fail silently.
SendObservationRequest(context.Context, *SendObservationRequestRequest) (*SendObservationRequestResponse, error)
// ChainGovernorStatus displays the status of the chain governor.
ChainGovernorStatus(context.Context, *ChainGovernorStatusRequest) (*ChainGovernorStatusResponse, error)
// ChainGovernorReload clears the chain governor history and reloads it from the database.
ChainGovernorReload(context.Context, *ChainGovernorReloadRequest) (*ChainGovernorReloadResponse, error)
// ChainGovernorDropPendingVAA drops a VAA from the chain governor pending list.
ChainGovernorDropPendingVAA(context.Context, *ChainGovernorDropPendingVAARequest) (*ChainGovernorDropPendingVAAResponse, error)
// ChainGovernorReleasePendingVAA release a VAA from the chain governor pending list, publishing it immediately.
ChainGovernorReleasePendingVAA(context.Context, *ChainGovernorReleasePendingVAARequest) (*ChainGovernorReleasePendingVAAResponse, error)
// ChainGovernorResetReleaseTimer resets the release timer for a chain governor pending VAA to the configured maximum.
ChainGovernorResetReleaseTimer(context.Context, *ChainGovernorResetReleaseTimerRequest) (*ChainGovernorResetReleaseTimerResponse, error)
// PurgePythNetVaas deletes PythNet VAAs from the database that are more than the specified number of days old.
PurgePythNetVaas(context.Context, *PurgePythNetVaasRequest) (*PurgePythNetVaasResponse, error)
// SignExistingVAA signs an existing VAA for a new guardian set using the local guardian key.
SignExistingVAA(context.Context, *SignExistingVAARequest) (*SignExistingVAAResponse, error)
mustEmbedUnimplementedNodePrivilegedServiceServer()
}
// UnimplementedNodePrivilegedServiceServer must be embedded to have forward compatible implementations.
type UnimplementedNodePrivilegedServiceServer struct {
}
func (UnimplementedNodePrivilegedServiceServer) InjectGovernanceVAA(context.Context, *InjectGovernanceVAARequest) (*InjectGovernanceVAAResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method InjectGovernanceVAA not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) FindMissingMessages(context.Context, *FindMissingMessagesRequest) (*FindMissingMessagesResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method FindMissingMessages not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) SendObservationRequest(context.Context, *SendObservationRequestRequest) (*SendObservationRequestResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method SendObservationRequest not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) ChainGovernorStatus(context.Context, *ChainGovernorStatusRequest) (*ChainGovernorStatusResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ChainGovernorStatus not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) ChainGovernorReload(context.Context, *ChainGovernorReloadRequest) (*ChainGovernorReloadResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ChainGovernorReload not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) ChainGovernorDropPendingVAA(context.Context, *ChainGovernorDropPendingVAARequest) (*ChainGovernorDropPendingVAAResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ChainGovernorDropPendingVAA not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) ChainGovernorReleasePendingVAA(context.Context, *ChainGovernorReleasePendingVAARequest) (*ChainGovernorReleasePendingVAAResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ChainGovernorReleasePendingVAA not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) ChainGovernorResetReleaseTimer(context.Context, *ChainGovernorResetReleaseTimerRequest) (*ChainGovernorResetReleaseTimerResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ChainGovernorResetReleaseTimer not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) PurgePythNetVaas(context.Context, *PurgePythNetVaasRequest) (*PurgePythNetVaasResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method PurgePythNetVaas not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) SignExistingVAA(context.Context, *SignExistingVAARequest) (*SignExistingVAAResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method SignExistingVAA not implemented")
}
func (UnimplementedNodePrivilegedServiceServer) mustEmbedUnimplementedNodePrivilegedServiceServer() {}
// UnsafeNodePrivilegedServiceServer may be embedded to opt out of forward compatibility for this service.
// Use of this interface is not recommended, as added methods to NodePrivilegedServiceServer will
// result in compilation errors.
type UnsafeNodePrivilegedServiceServer interface {
mustEmbedUnimplementedNodePrivilegedServiceServer()
}
func RegisterNodePrivilegedServiceServer(s grpc.ServiceRegistrar, srv NodePrivilegedServiceServer) {
s.RegisterService(&NodePrivilegedService_ServiceDesc, srv)
}
func _NodePrivilegedService_InjectGovernanceVAA_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(InjectGovernanceVAARequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).InjectGovernanceVAA(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/InjectGovernanceVAA",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).InjectGovernanceVAA(ctx, req.(*InjectGovernanceVAARequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_FindMissingMessages_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(FindMissingMessagesRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).FindMissingMessages(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/FindMissingMessages",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).FindMissingMessages(ctx, req.(*FindMissingMessagesRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_SendObservationRequest_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(SendObservationRequestRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).SendObservationRequest(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/SendObservationRequest",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).SendObservationRequest(ctx, req.(*SendObservationRequestRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_ChainGovernorStatus_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ChainGovernorStatusRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).ChainGovernorStatus(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/ChainGovernorStatus",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).ChainGovernorStatus(ctx, req.(*ChainGovernorStatusRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_ChainGovernorReload_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ChainGovernorReloadRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).ChainGovernorReload(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/ChainGovernorReload",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).ChainGovernorReload(ctx, req.(*ChainGovernorReloadRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_ChainGovernorDropPendingVAA_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ChainGovernorDropPendingVAARequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).ChainGovernorDropPendingVAA(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/ChainGovernorDropPendingVAA",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).ChainGovernorDropPendingVAA(ctx, req.(*ChainGovernorDropPendingVAARequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_ChainGovernorReleasePendingVAA_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ChainGovernorReleasePendingVAARequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).ChainGovernorReleasePendingVAA(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/ChainGovernorReleasePendingVAA",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).ChainGovernorReleasePendingVAA(ctx, req.(*ChainGovernorReleasePendingVAARequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_ChainGovernorResetReleaseTimer_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ChainGovernorResetReleaseTimerRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).ChainGovernorResetReleaseTimer(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/ChainGovernorResetReleaseTimer",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).ChainGovernorResetReleaseTimer(ctx, req.(*ChainGovernorResetReleaseTimerRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_PurgePythNetVaas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(PurgePythNetVaasRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).PurgePythNetVaas(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/PurgePythNetVaas",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).PurgePythNetVaas(ctx, req.(*PurgePythNetVaasRequest))
}
return interceptor(ctx, in, info, handler)
}
func _NodePrivilegedService_SignExistingVAA_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(SignExistingVAARequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(NodePrivilegedServiceServer).SignExistingVAA(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/node.v1.NodePrivilegedService/SignExistingVAA",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(NodePrivilegedServiceServer).SignExistingVAA(ctx, req.(*SignExistingVAARequest))
}
return interceptor(ctx, in, info, handler)
}
// NodePrivilegedService_ServiceDesc is the grpc.ServiceDesc for NodePrivilegedService service.
// It's only intended for direct use with grpc.RegisterService,
// and not to be introspected or modified (even as a copy)
var NodePrivilegedService_ServiceDesc = grpc.ServiceDesc{
ServiceName: "node.v1.NodePrivilegedService",
HandlerType: (*NodePrivilegedServiceServer)(nil),
Methods: []grpc.MethodDesc{
{
MethodName: "InjectGovernanceVAA",
Handler: _NodePrivilegedService_InjectGovernanceVAA_Handler,
},
{
MethodName: "FindMissingMessages",
Handler: _NodePrivilegedService_FindMissingMessages_Handler,
},
{
MethodName: "SendObservationRequest",
Handler: _NodePrivilegedService_SendObservationRequest_Handler,
},
{
MethodName: "ChainGovernorStatus",
Handler: _NodePrivilegedService_ChainGovernorStatus_Handler,
},
{
MethodName: "ChainGovernorReload",
Handler: _NodePrivilegedService_ChainGovernorReload_Handler,
},
{
MethodName: "ChainGovernorDropPendingVAA",
Handler: _NodePrivilegedService_ChainGovernorDropPendingVAA_Handler,
},
{
MethodName: "ChainGovernorReleasePendingVAA",
Handler: _NodePrivilegedService_ChainGovernorReleasePendingVAA_Handler,
},
{
MethodName: "ChainGovernorResetReleaseTimer",
Handler: _NodePrivilegedService_ChainGovernorResetReleaseTimer_Handler,
},
{
MethodName: "PurgePythNetVaas",
Handler: _NodePrivilegedService_PurgePythNetVaas_Handler,
},
{
MethodName: "SignExistingVAA",
Handler: _NodePrivilegedService_SignExistingVAA_Handler,
},
},
Streams: []grpc.StreamDesc{},
Metadata: "node/v1/node.proto",
}