Skip to content

Commit 5e3589a

Browse files
committed
Regenerate PKI module's files
1 parent cfbd37e commit 5e3589a

File tree

5 files changed

+303
-263
lines changed

5 files changed

+303
-263
lines changed

vue/src/store/generated/zigbee-alliance/distributed-compliance-ledger/zigbeealliance.distributedcomplianceledger.pki/index.ts

+109-73
Original file line numberDiff line numberDiff line change
@@ -400,9 +400,13 @@ export default {
400400
try {
401401
const key = params ?? {};
402402
const queryClient=await initQueryClient(rootGetters)
403-
let value= (await queryClient.queryProposedCertificateRevocation( key.subject, key.subjectKeyId)).data
403+
let value= (await queryClient.queryProposedCertificateRevocation( key.subject, key.subjectKeyId, query)).data
404404

405405

406+
while (all && (<any> value).pagination && (<any> value).pagination.next_key!=null) {
407+
let next_values=(await queryClient.queryProposedCertificateRevocation( key.subject, key.subjectKeyId, {...query, 'pagination.key':(<any> value).pagination.next_key})).data
408+
value = mergeResults(value, next_values);
409+
}
406410
commit('QUERY', { query: 'ProposedCertificateRevocation', key: { params: {...key}, query}, value })
407411
if (subscribe) commit('SUBSCRIBE', { action: 'QueryProposedCertificateRevocation', payload: { options: { all }, params: {...key},query }})
408412
return getters['getProposedCertificateRevocation']( { params: {...key}, query}) ?? {}
@@ -669,57 +673,56 @@ export default {
669673

670674
}
671675
},
672-
673-
674-
675-
676-
677-
678-
679-
async QueryNocRootCertificates({ commit, rootGetters, getters }, { options: { subscribe, all} = { subscribe:false, all:false}, params, query=null }) {
680-
try {
681-
const key = params ?? {};
682-
const queryClient=await initQueryClient(rootGetters)
683-
let value= (await queryClient.queryNocRootCertificates( key.vid)).data
684-
685-
686-
commit('QUERY', { query: 'NocRootCertificates', key: { params: {...key}, query}, value })
687-
if (subscribe) commit('SUBSCRIBE', { action: 'QueryNocRootCertificates', payload: { options: { all }, params: {...key},query }})
688-
return getters['getNocRootCertificates']( { params: {...key}, query}) ?? {}
689-
} catch (e) {
690-
throw new Error('QueryClient:QueryNocRootCertificates API Node Unavailable. Could not perform query: ' + e.message)
691-
692-
}
693-
},
694-
695-
696-
697-
698-
699-
700-
701-
async QueryNocRootCertificatesAll({ commit, rootGetters, getters }, { options: { subscribe, all} = { subscribe:false, all:false}, params, query=null }) {
702-
try {
703-
const key = params ?? {};
704-
const queryClient=await initQueryClient(rootGetters)
705-
let value= (await queryClient.queryNocRootCertificatesAll(query)).data
706-
707-
708-
while (all && (<any> value).pagination && (<any> value).pagination.next_key!=null) {
709-
let next_values=(await queryClient.queryNocRootCertificatesAll({...query, 'pagination.key':(<any> value).pagination.next_key})).data
710-
value = mergeResults(value, next_values);
711-
}
712-
commit('QUERY', { query: 'NocRootCertificatesAll', key: { params: {...key}, query}, value })
713-
if (subscribe) commit('SUBSCRIBE', { action: 'QueryNocRootCertificatesAll', payload: { options: { all }, params: {...key},query }})
714-
return getters['getNocRootCertificatesAll']( { params: {...key}, query}) ?? {}
715-
} catch (e) {
716-
throw new Error('QueryClient:QueryNocRootCertificatesAll API Node Unavailable. Could not perform query: ' + e.message)
717-
718-
}
719-
},
720-
721676

722677

678+
679+
680+
681+
682+
683+
async QueryNocRootCertificates({ commit, rootGetters, getters }, { options: { subscribe, all} = { subscribe:false, all:false}, params, query=null }) {
684+
try {
685+
const key = params ?? {};
686+
const queryClient=await initQueryClient(rootGetters)
687+
let value= (await queryClient.queryNocRootCertificates( key.vid)).data
688+
689+
690+
commit('QUERY', { query: 'NocRootCertificates', key: { params: {...key}, query}, value })
691+
if (subscribe) commit('SUBSCRIBE', { action: 'QueryNocRootCertificates', payload: { options: { all }, params: {...key},query }})
692+
return getters['getNocRootCertificates']( { params: {...key}, query}) ?? {}
693+
} catch (e) {
694+
throw new SpVuexError('QueryClient:QueryNocRootCertificates', 'API Node Unavailable. Could not perform query: ' + e.message)
695+
696+
}
697+
},
698+
699+
700+
701+
702+
703+
704+
705+
async QueryNocRootCertificatesAll({ commit, rootGetters, getters }, { options: { subscribe, all} = { subscribe:false, all:false}, params, query=null }) {
706+
try {
707+
const key = params ?? {};
708+
const queryClient=await initQueryClient(rootGetters)
709+
let value= (await queryClient.queryNocRootCertificatesAll(query)).data
710+
711+
712+
while (all && (<any> value).pagination && (<any> value).pagination.next_key!=null) {
713+
let next_values=(await queryClient.queryNocRootCertificatesAll({...query, 'pagination.key':(<any> value).pagination.next_key})).data
714+
value = mergeResults(value, next_values);
715+
}
716+
commit('QUERY', { query: 'NocRootCertificatesAll', key: { params: {...key}, query}, value })
717+
if (subscribe) commit('SUBSCRIBE', { action: 'QueryNocRootCertificatesAll', payload: { options: { all }, params: {...key},query }})
718+
return getters['getNocRootCertificatesAll']( { params: {...key}, query}) ?? {}
719+
} catch (e) {
720+
throw new SpVuexError('QueryClient:QueryNocRootCertificatesAll', 'API Node Unavailable. Could not perform query: ' + e.message)
721+
722+
}
723+
},
724+
725+
723726
async sendMsgRejectAddX509RootCert({ rootGetters }, { value, fee = [], memo = '' }) {
724727
try {
725728
const txClient=await initTxClient(rootGetters)
@@ -885,6 +888,36 @@ export default {
885888
}
886889
}
887890
},
891+
async sendMsgAddNocX509RootCert({ rootGetters }, { value, fee = [], memo = '' }) {
892+
try {
893+
const txClient=await initTxClient(rootGetters)
894+
const msg = await txClient.msgAddNocX509RootCert(value)
895+
const result = await txClient.signAndBroadcast([msg], {fee: { amount: fee,
896+
gas: "200000" }, memo})
897+
return result
898+
} catch (e) {
899+
if (e == MissingWalletError) {
900+
throw new SpVuexError('TxClient:MsgAddNocX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
901+
}else{
902+
throw new SpVuexError('TxClient:MsgAddNocX509RootCert:Send', 'Could not broadcast Tx: '+ e.message)
903+
}
904+
}
905+
},
906+
async sendMsgRemoveX509Cert({ rootGetters }, { value, fee = [], memo = '' }) {
907+
try {
908+
const txClient=await initTxClient(rootGetters)
909+
const msg = await txClient.msgRemoveX509Cert(value)
910+
const result = await txClient.signAndBroadcast([msg], {fee: { amount: fee,
911+
gas: "200000" }, memo})
912+
return result
913+
} catch (e) {
914+
if (e == MissingWalletError) {
915+
throw new SpVuexError('TxClient:MsgRemoveX509Cert:Init', 'Could not initialize signing client. Wallet is required.')
916+
}else{
917+
throw new SpVuexError('TxClient:MsgRemoveX509Cert:Send', 'Could not broadcast Tx: '+ e.message)
918+
}
919+
}
920+
},
888921

889922
async MsgProposeAddX509RootCert({ rootGetters }, { value }) {
890923
try {
@@ -896,7 +929,6 @@ export default {
896929
throw new SpVuexError('TxClient:MsgProposeAddX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
897930
}else{
898931
throw new SpVuexError('TxClient:MsgProposeAddX509RootCert:Create', 'Could not create message: ' + e.message)
899-
900932
}
901933
}
902934
},
@@ -923,7 +955,6 @@ export default {
923955
throw new SpVuexError('TxClient:MsgProposeRevokeX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
924956
}else{
925957
throw new SpVuexError('TxClient:MsgProposeRevokeX509RootCert:Create', 'Could not create message: ' + e.message)
926-
927958
}
928959
}
929960
},
@@ -937,7 +968,6 @@ export default {
937968
throw new SpVuexError('TxClient:MsgRevokeX509Cert:Init', 'Could not initialize signing client. Wallet is required.')
938969
}else{
939970
throw new SpVuexError('TxClient:MsgRevokeX509Cert:Create', 'Could not create message: ' + e.message)
940-
941971
}
942972
}
943973
},
@@ -951,7 +981,6 @@ export default {
951981
throw new SpVuexError('TxClient:MsgApproveRevokeX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
952982
}else{
953983
throw new SpVuexError('TxClient:MsgApproveRevokeX509RootCert:Create', 'Could not create message: ' + e.message)
954-
955984
}
956985
}
957986
},
@@ -965,7 +994,6 @@ export default {
965994
throw new SpVuexError('TxClient:MsgUpdatePkiRevocationDistributionPoint:Init', 'Could not initialize signing client. Wallet is required.')
966995
}else{
967996
throw new SpVuexError('TxClient:MsgUpdatePkiRevocationDistributionPoint:Create', 'Could not create message: ' + e.message)
968-
969997
}
970998
}
971999
},
@@ -979,7 +1007,6 @@ export default {
9791007
throw new SpVuexError('TxClient:MsgRejectAddX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
9801008
}else{
9811009
throw new SpVuexError('TxClient:MsgRejectAddX509RootCert:Create', 'Could not create message: ' + e.message)
982-
9831010
}
9841011
}
9851012
},
@@ -993,7 +1020,6 @@ export default {
9931020
throw new SpVuexError('TxClient:MsgAddPkiRevocationDistributionPoint:Init', 'Could not initialize signing client. Wallet is required.')
9941021
}else{
9951022
throw new SpVuexError('TxClient:MsgAddPkiRevocationDistributionPoint:Create', 'Could not create message: ' + e.message)
996-
9971023
}
9981024
}
9991025
},
@@ -1007,7 +1033,6 @@ export default {
10071033
throw new SpVuexError('TxClient:MsgApproveAddX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
10081034
}else{
10091035
throw new SpVuexError('TxClient:MsgApproveAddX509RootCert:Create', 'Could not create message: ' + e.message)
1010-
10111036
}
10121037
}
10131038
},
@@ -1021,7 +1046,6 @@ export default {
10211046
throw new SpVuexError('TxClient:MsgDeletePkiRevocationDistributionPoint:Init', 'Could not initialize signing client. Wallet is required.')
10221047
}else{
10231048
throw new SpVuexError('TxClient:MsgDeletePkiRevocationDistributionPoint:Create', 'Could not create message: ' + e.message)
1024-
10251049
}
10261050
}
10271051
},
@@ -1035,23 +1059,35 @@ export default {
10351059
throw new SpVuexError('TxClient:MsgAddX509Cert:Init', 'Could not initialize signing client. Wallet is required.')
10361060
}else{
10371061
throw new SpVuexError('TxClient:MsgAddX509Cert:Create', 'Could not create message: ' + e.message)
1038-
10391062
}
10401063
}
10411064
},
10421065
async MsgAddNocX509RootCert({ rootGetters }, { value }) {
1043-
try {
1044-
const txClient=await initTxClient(rootGetters)
1045-
const msg = await txClient.msgAddNocX509RootCert(value)
1046-
return msg
1047-
} catch (e) {
1048-
if (e == MissingWalletError) {
1049-
throw new Error('TxClient:MsgAddNocX509RootCert:Init Could not initialize signing client. Wallet is required.')
1050-
}else{
1051-
throw new Error('TxClient:MsgAddNocX509RootCert:Create Could not create message: ' + e.message)
1052-
}
1053-
}
1054-
},
1055-
1066+
try {
1067+
const txClient=await initTxClient(rootGetters)
1068+
const msg = await txClient.msgAddNocX509RootCert(value)
1069+
return msg
1070+
} catch (e) {
1071+
if (e == MissingWalletError) {
1072+
throw new SpVuexError('TxClient:MsgAddNocX509RootCert:Init', 'Could not initialize signing client. Wallet is required.')
1073+
}else{
1074+
throw new SpVuexError('TxClient:MsgAddNocX509RootCert:Create', 'Could not create message: ' + e.message)
1075+
}
1076+
}
1077+
},
1078+
async MsgRemoveX509Cert({ rootGetters }, { value }) {
1079+
try {
1080+
const txClient=await initTxClient(rootGetters)
1081+
const msg = await txClient.msgRemoveX509Cert(value)
1082+
return msg
1083+
} catch (e) {
1084+
if (e == MissingWalletError) {
1085+
throw new SpVuexError('TxClient:MsgRemoveX509Cert:Init', 'Could not initialize signing client. Wallet is required.')
1086+
}else{
1087+
throw new SpVuexError('TxClient:MsgRemoveX509Cert:Create', 'Could not create message: ' + e.message)
1088+
}
1089+
}
1090+
},
1091+
10561092
}
10571093
}

vue/src/store/generated/zigbee-alliance/distributed-compliance-ledger/zigbeealliance.distributedcomplianceledger.pki/module/types/pki/tx.ts

-1
Original file line numberDiff line numberDiff line change
@@ -2390,7 +2390,6 @@ export interface Msg {
23902390
DeletePkiRevocationDistributionPoint(request: MsgDeletePkiRevocationDistributionPoint): Promise<MsgDeletePkiRevocationDistributionPointResponse>
23912391
AssignVid(request: MsgAssignVid): Promise<MsgAssignVidResponse>
23922392
AddNocX509RootCert(request: MsgAddNocX509RootCert): Promise<MsgAddNocX509RootCertResponse>
2393-
AssignVid(request: MsgAssignVid): Promise<MsgAssignVidResponse>
23942393
/** this line is used by starport scaffolding # proto/tx/rpc */
23952394
RemoveX509Cert(request: MsgRemoveX509Cert): Promise<MsgRemoveX509CertResponse>
23962395
}

x/pki/keeper/grpc_query_noc_root_certificates_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func TestNocRootCertificatesQuerySingle(t *testing.T) {
4747
request: &types.QueryGetNocRootCertificatesRequest{
4848
Vid: 100000,
4949
},
50-
err: status.Error(codes.InvalidArgument, "not found"),
50+
err: status.Error(codes.NotFound, "not found"),
5151
},
5252
{
5353
desc: "InvalidRequest",

0 commit comments

Comments
 (0)