[MIRROR ONLY] A correct and efficient ATProto blob proxy for secure content delivery. codeberg.org/Blooym/porxie
36
fork

Configure Feed

Select the types of activity you want to include in your feed.

chore: fix bad generated fn name

Lyna fcd36d69 35b347a2

+37 -44
+37 -44
crates/lexgen/src/dev_blooym/porxie/get_blob_policy.rs
··· 13 13 14 14 #[allow(unused_imports)] 15 15 use jacquard_common::deps::codegen::unicode_segmentation::UnicodeSegmentation; 16 - use jacquard_common::types::string::{Did, Cid}; 16 + use jacquard_common::types::string::{Cid, Did}; 17 17 use jacquard_derive::{IntoStatic, lexicon}; 18 18 use jacquard_lexicon::lexicon::LexiconDoc; 19 19 use jacquard_lexicon::schema::LexiconSchema; 20 20 21 + use crate::dev_blooym::porxie::get_blob_policy; 21 22 #[allow(unused_imports)] 22 23 use jacquard_lexicon::validation::{ConstraintError, ValidationPath}; 23 - use serde::{Serialize, Deserialize}; 24 - use crate::dev_blooym::porxie::get_blob_policy; 24 + use serde::{Deserialize, Serialize}; 25 25 /// Blob is allowed to be served. 26 26 27 27 #[lexicon] ··· 44 44 pub did: Did<'a>, 45 45 } 46 46 47 - 48 47 #[lexicon] 49 48 #[derive(Serialize, Deserialize, Debug, Clone, PartialEq, Eq, IntoStatic)] 50 49 #[serde(rename_all = "camelCase")] ··· 52 51 #[serde(borrow)] 53 52 pub policy: GetBlobPolicyOutputPolicy<'a>, 54 53 } 55 - 56 54 57 55 #[derive(Serialize, Deserialize, Debug, Clone, PartialEq, Eq, IntoStatic)] 58 56 #[serde(tag = "$type")] ··· 72 70 "allowed" 73 71 } 74 72 fn lexicon_doc() -> LexiconDoc<'static> { 75 - lexicon_doc_dev_blooym_porxie_getBlobPolicy() 73 + lexicon_doc_dev_blooym_porxie_get_blob_policy() 76 74 } 77 75 fn validate(&self) -> Result<(), ConstraintError> { 78 76 Ok(()) ··· 87 85 "forbidden" 88 86 } 89 87 fn lexicon_doc() -> LexiconDoc<'static> { 90 - lexicon_doc_dev_blooym_porxie_getBlobPolicy() 88 + lexicon_doc_dev_blooym_porxie_get_blob_policy() 91 89 } 92 90 fn validate(&self) -> Result<(), ConstraintError> { 93 91 Ok(()) ··· 118 116 type Response = GetBlobPolicyResponse; 119 117 } 120 118 121 - fn lexicon_doc_dev_blooym_porxie_getBlobPolicy() -> LexiconDoc<'static> { 119 + fn lexicon_doc_dev_blooym_porxie_get_blob_policy() -> LexiconDoc<'static> { 120 + use alloc::collections::BTreeMap; 122 121 #[allow(unused_imports)] 123 122 use jacquard_common::{CowStr, deps::smol_str::SmolStr, types::blob::MimeType}; 124 123 use jacquard_lexicon::lexicon::*; 125 - use alloc::collections::BTreeMap; 126 124 LexiconDoc { 127 125 lexicon: Lexicon::Lexicon1, 128 126 id: CowStr::new_static("dev.blooym.porxie.getBlobPolicy"), ··· 131 129 map.insert( 132 130 SmolStr::new_static("allowed"), 133 131 LexUserType::Object(LexObject { 134 - description: Some( 135 - CowStr::new_static("Blob is allowed to be served."), 136 - ), 132 + description: Some(CowStr::new_static("Blob is allowed to be served.")), 137 133 properties: { 138 134 #[allow(unused_mut)] 139 135 let mut map = BTreeMap::new(); ··· 145 141 map.insert( 146 142 SmolStr::new_static("forbidden"), 147 143 LexUserType::Object(LexObject { 148 - description: Some( 149 - CowStr::new_static("Blob is not allowed to be served."), 150 - ), 144 + description: Some(CowStr::new_static("Blob is not allowed to be served.")), 151 145 properties: { 152 146 #[allow(unused_mut)] 153 147 let mut map = BTreeMap::new(); ··· 159 153 map.insert( 160 154 SmolStr::new_static("main"), 161 155 LexUserType::XrpcQuery(LexXrpcQuery { 162 - parameters: Some( 163 - LexXrpcQueryParameter::Params(LexXrpcParameters { 164 - required: Some( 165 - vec![SmolStr::new_static("did"), SmolStr::new_static("cid")], 166 - ), 167 - properties: { 168 - #[allow(unused_mut)] 169 - let mut map = BTreeMap::new(); 170 - map.insert( 171 - SmolStr::new_static("cid"), 172 - LexXrpcParametersProperty::String(LexString { 173 - format: Some(LexStringFormat::Cid), 174 - ..Default::default() 175 - }), 176 - ); 177 - map.insert( 178 - SmolStr::new_static("did"), 179 - LexXrpcParametersProperty::String(LexString { 180 - format: Some(LexStringFormat::Did), 181 - ..Default::default() 182 - }), 183 - ); 184 - map 185 - }, 186 - ..Default::default() 187 - }), 188 - ), 156 + parameters: Some(LexXrpcQueryParameter::Params(LexXrpcParameters { 157 + required: Some(vec![ 158 + SmolStr::new_static("did"), 159 + SmolStr::new_static("cid"), 160 + ]), 161 + properties: { 162 + #[allow(unused_mut)] 163 + let mut map = BTreeMap::new(); 164 + map.insert( 165 + SmolStr::new_static("cid"), 166 + LexXrpcParametersProperty::String(LexString { 167 + format: Some(LexStringFormat::Cid), 168 + ..Default::default() 169 + }), 170 + ); 171 + map.insert( 172 + SmolStr::new_static("did"), 173 + LexXrpcParametersProperty::String(LexString { 174 + format: Some(LexStringFormat::Did), 175 + ..Default::default() 176 + }), 177 + ); 178 + map 179 + }, 180 + ..Default::default() 181 + })), 189 182 ..Default::default() 190 183 }), 191 184 ); ··· 197 190 198 191 pub mod get_blob_policy_state { 199 192 200 - pub use crate::builder_types::{Set, Unset, IsSet, IsUnset}; 193 + pub use crate::builder_types::{IsSet, IsUnset, Set, Unset}; 201 194 #[allow(unused)] 202 195 use ::core::marker::PhantomData; 203 196 mod sealed { ··· 315 308 did: self._fields.1.unwrap(), 316 309 } 317 310 } 318 - } 311 + }