2020-03-23 10:50:40 +01:00
|
|
|
syntax = "proto3";
|
|
|
|
|
|
|
|
import "google/api/annotations.proto";
|
|
|
|
import "google/protobuf/empty.proto";
|
|
|
|
import "google/protobuf/struct.proto";
|
|
|
|
import "google/protobuf/timestamp.proto";
|
|
|
|
import "protoc-gen-swagger/options/annotations.proto";
|
|
|
|
import "validate/validate.proto";
|
|
|
|
import "google/protobuf/descriptor.proto";
|
|
|
|
import "authoption/options.proto";
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
package caos.zitadel.management.api.v1;
|
2020-03-23 10:50:40 +01:00
|
|
|
|
2020-03-23 16:56:02 +01:00
|
|
|
option go_package = "github.com/caos/zitadel/pkg/management/api/grpc";
|
2020-03-23 10:50:40 +01:00
|
|
|
|
|
|
|
option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = {
|
|
|
|
info: {
|
|
|
|
title: "Management API";
|
2020-03-23 12:25:16 +01:00
|
|
|
version: "0.1";
|
|
|
|
contact:{
|
2020-03-23 16:56:02 +01:00
|
|
|
url: "https://github.com/caos/zitadel/pkg/management"
|
2020-03-23 12:25:16 +01:00
|
|
|
};
|
|
|
|
};
|
2020-03-23 10:50:40 +01:00
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
schemes: HTTPS;
|
2020-03-23 10:50:40 +01:00
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
consumes: "application/json";
|
|
|
|
consumes: "application/grpc";
|
2020-03-23 10:50:40 +01:00
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
produces: "application/json";
|
|
|
|
produces: "application/grpc";
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// All requests are based on your context if nothing other is specified
|
|
|
|
// Requests which have /me in the url get the parameter from the context
|
2020-03-23 10:50:40 +01:00
|
|
|
service ManagementService {
|
2020-06-23 10:09:30 +02:00
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
//READINESS
|
|
|
|
rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/healthz"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/ready"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/validate"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// GetIam returns some needed settings of the iam (Global Organisation ID, Zitadel Project ID)
|
2020-06-17 07:25:04 +02:00
|
|
|
rpc GetIam(google.protobuf.Empty) returns (Iam) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/iam"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "authenticated"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc GetUserByID(UserID) returns (UserView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// GetUserByEmailGlobal returns User, global search is overall organisations
|
|
|
|
rpc GetUserByEmailGlobal(Email) returns (UserView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
get: "/global/users/_byemail"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// Limit should always be set, there is a default limit set by the service
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc SearchUsers(UserSearchRequest) returns (UserSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/_isunique"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreateUser(CreateUserRequest) returns (User) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeactivateUser(UserID) returns (User) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ReactivateUser(UserID) returns (User) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc LockUser(UserID) returns (User) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/_lock"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UnlockUser(UserID) returns (User) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/_unlock"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeleteUser(UserID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/users/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// UserChanges returns the event stream of the user object
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc UserChanges(ChangeRequest) returns (Changes) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/changes"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// ApplicationChanges returns the event stream of the application object
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc ApplicationChanges(ChangeRequest) returns (Changes) {
|
|
|
|
option (google.api.http) = {
|
2020-06-15 16:50:09 +02:00
|
|
|
get: "/projects/{id}/applications/{sec_id}/changes"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// OrgChanges returns the event stream of the org object
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc OrgChanges(ChangeRequest) returns (Changes) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/orgs/{id}/changes"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// ProjectChanges returns the event stream of the project object
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc ProjectChanges(ChangeRequest) returns (Changes) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/{id}/changes"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
rpc GetUserProfile(UserID) returns (UserProfileView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/profile"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateUserProfile(UpdateUserProfileRequest) returns (UserProfile) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/profile"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
rpc GetUserEmail(UserID) returns (UserEmailView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/email"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ChangeUserEmail(UpdateUserEmailRequest) returns (UserEmail) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/email"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users/{id}/email/_resendverification"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
rpc GetUserPhone(UserID) returns (UserPhoneView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/phone"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ChangeUserPhone(UpdateUserPhoneRequest) returns (UserPhone) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/phone"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-07-06 15:48:24 +02:00
|
|
|
rpc RemoveUserPhone(UserID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/users/{id}/phone"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc ResendPhoneVerificationCode(UserID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users/{id}/phone/_resendverification"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
rpc GetUserAddress(UserID) returns (UserAddressView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/address"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateUserAddress(UpdateUserAddressRequest) returns (UserAddress) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{id}/address"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
2020-06-23 10:09:30 +02:00
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc GetUserMfas(UserID) returns (MultiFactors) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{id}/mfas"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sends an Notification (Email/SMS) with a password reset Link
|
|
|
|
rpc SendSetPasswordNotification(SetPasswordNotificationRequest) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
post: "/users/{id}/password/_sendsetnotification"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
// A Manager is only allowed to set an initial password, on the next login the user has to change his password
|
|
|
|
rpc SetInitialPassword(PasswordRequest) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
post: "/users/{id}/password/_initialize"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// returns default policy if nothing other set on organisation
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc GetPasswordComplexityPolicy(google.protobuf.Empty) returns (PasswordComplexityPolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/policies/passwords/complexity"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreatePasswordComplexityPolicy(PasswordComplexityPolicyCreate) returns (PasswordComplexityPolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/policies/passwords/complexity"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdatePasswordComplexityPolicy(PasswordComplexityPolicyUpdate) returns (PasswordComplexityPolicy) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
put: "/policies/passwords/complexity"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeletePasswordComplexityPolicy(PasswordComplexityPolicyID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
delete: "/policies/passwords/complexity"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// returns default if nothing other set on organisation
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc GetPasswordAgePolicy(google.protobuf.Empty) returns (PasswordAgePolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/policies/passwords/age"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreatePasswordAgePolicy(PasswordAgePolicyCreate) returns (PasswordAgePolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/policies/passwords/age"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdatePasswordAgePolicy(PasswordAgePolicyUpdate) returns (PasswordAgePolicy) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
put: "/policies/passwords/age"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeletePasswordAgePolicy(PasswordAgePolicyID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
delete: "/policies/passwords/age"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// returns default if nothing other set on organisation
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc GetPasswordLockoutPolicy(google.protobuf.Empty) returns (PasswordLockoutPolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/policies/passwords/lockout"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreatePasswordLockoutPolicy(PasswordLockoutPolicyCreate) returns (PasswordLockoutPolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/policies/passwords/lockout"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdatePasswordLockoutPolicy(PasswordLockoutPolicyUpdate) returns (PasswordLockoutPolicy) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
put: "/policies/passwords/lockout"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeletePasswordLockoutPolicy(PasswordLockoutPolicyID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-05-14 11:48:57 +02:00
|
|
|
delete: "/policies/passwords/lockout"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "policy.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
rpc GetMyOrg(google.protobuf.Empty) returns (OrgView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
get: "/orgs/me"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// search a organisation by its domain overall organisations
|
|
|
|
rpc GetOrgByDomainGlobal(Domain) returns (OrgView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
get: "/global/orgs/_bydomain"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
rpc DeactivateMyOrg(google.protobuf.Empty) returns (Org) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
put: "/orgs/me/_deactivate"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
rpc ReactivateMyOrg(google.protobuf.Empty) returns (Org) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-23 10:09:30 +02:00
|
|
|
put: "/orgs/me/_reactivate"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-16 11:40:18 +02:00
|
|
|
rpc SearchMyOrgDomains(OrgDomainSearchRequest) returns (OrgDomainSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/orgs/me/domains/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "org.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc AddMyOrgDomain(AddOrgDomainRequest) returns (OrgDomain) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/orgs/me/domains"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "org.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc RemoveMyOrgDomain(RemoveOrgDomainRequest) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/orgs/me/domains/{domain}"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "org.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-19 07:27:16 +02:00
|
|
|
rpc GetMyOrgIamPolicy(google.protobuf.Empty) returns (OrgIamPolicy) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/orgs/me/iampolicy"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "authenticated"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc GetOrgMemberRoles(google.protobuf.Empty) returns (OrgMemberRoles) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/orgs/members/roles"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.member.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-10 10:47:50 +02:00
|
|
|
rpc AddMyOrgMember(AddOrgMemberRequest) returns (OrgMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-10 10:47:50 +02:00
|
|
|
post: "/orgs/me/members"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.member.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-10 10:47:50 +02:00
|
|
|
rpc ChangeMyOrgMember(ChangeOrgMemberRequest) returns (OrgMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-10 10:47:50 +02:00
|
|
|
put: "/orgs/me/members/{user_id}"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.member.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-10 10:47:50 +02:00
|
|
|
rpc RemoveMyOrgMember(RemoveOrgMemberRequest) returns (google.protobuf.Empty) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-10 10:47:50 +02:00
|
|
|
delete: "/orgs/me/members/{user_id}"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.member.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-10 10:47:50 +02:00
|
|
|
rpc SearchMyOrgMembers(OrgMemberSearchRequest) returns (OrgMemberSearchResponse) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-10 10:47:50 +02:00
|
|
|
post: "/orgs/me/members/_search"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "org.member.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
rpc SearchProjects(ProjectSearchRequest) returns (ProjectSearchResponse) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-06-15 14:50:39 +02:00
|
|
|
post: "/projects/_search"
|
2020-03-23 10:50:40 +01:00
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc ProjectByID(ProjectID) returns (ProjectView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.read"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreateProject(ProjectCreateRequest) returns (Project) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateProject(ProjectUpdateRequest) returns (Project) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeactivateProject(ProjectID) returns (Project) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ReactivateProject(ProjectID) returns (Project) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// returns all projects my organisation got granted from another organisation
|
2020-06-15 14:50:39 +02:00
|
|
|
rpc SearchGrantedProjects(GrantedProjectSearchRequest) returns (ProjectGrantSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/grantedprojects/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "project.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// returns a project my organisation got granted from another organisation
|
2020-06-15 14:50:39 +02:00
|
|
|
rpc GetGrantedProjectByID(ProjectGrantID) returns (ProjectGrantView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
2020-05-11 12:16:29 +02:00
|
|
|
get: "/grantedprojects/{project_id}/grants/{id}"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc GetProjectMemberRoles(google.protobuf.Empty) returns (ProjectMemberRoles) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/members/roles"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.member.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc SearchProjectMembers(ProjectMemberSearchRequest) returns (ProjectMemberSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/members/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.member.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-15 17:11:42 +02:00
|
|
|
rpc AddProjectMember(ProjectMemberAdd) returns (ProjectMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{id}/members"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.member.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-15 17:11:42 +02:00
|
|
|
rpc ChangeProjectMember(ProjectMemberChange) returns (ProjectMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{id}/members/{user_id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.member.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc RemoveProjectMember(ProjectMemberRemove) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/projects/{id}/members/{user_id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.member.delete"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc SearchProjectRoles(ProjectRoleSearchRequest) returns (ProjectRoleSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/roles/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.role.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-21 17:00:32 +02:00
|
|
|
rpc AddProjectRole(ProjectRoleAdd) returns (ProjectRole) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{id}/roles"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.role.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// add a list of project roles in one request
|
2020-06-19 15:32:03 +02:00
|
|
|
rpc BulkAddProjectRole(ProjectRoleAddBulk) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{id}/roles/_bulk"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "project.role.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-21 17:00:32 +02:00
|
|
|
rpc ChangeProjectRole(ProjectRoleChange) returns (ProjectRole) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{id}/roles/{key}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "project.role.write"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// RemoveProjectRole removes role from UserGrants, ProjectGrants and from Project
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc RemoveProjectRole(ProjectRoleRemove) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
2020-04-21 17:00:32 +02:00
|
|
|
delete: "/projects/{id}/roles/{key}"
|
2020-03-23 10:50:40 +01:00
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.role.delete"
|
|
|
|
check_field_name: "Id"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/applications/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc ApplicationByID(ApplicationID) returns (ApplicationView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/{project_id}/applications/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreateOIDCApplication(OIDCApplicationCreate) returns (Application) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/oidcapplications"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateApplication(ApplicationUpdate) returns (Application) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/applications/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeactivateApplication(ApplicationID) returns (Application) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/applications/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ReactivateApplication(ApplicationID) returns (Application) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/applications/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-21 17:00:32 +02:00
|
|
|
rpc RemoveApplication(ApplicationID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/projects/{project_id}/applications/{id}"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "project.app.delete"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc UpdateApplicationOIDCConfig(OIDCConfigUpdate) returns (OIDCConfig) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/applications/{application_id}/oidcconfig"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc RegenerateOIDCClientSecret(ApplicationID) returns (ClientSecret) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.app.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc SearchProjectGrants(ProjectGrantSearchRequest) returns (ProjectGrantSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/grants/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc ProjectGrantByID(ProjectGrantID) returns (ProjectGrantView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/{project_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreateProjectGrant(ProjectGrantCreate) returns (ProjectGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/grants"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateProjectGrant(ProjectGrantUpdate) returns (ProjectGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/grants/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/grants/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ReactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/grants/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// RemoveProjectGrant removes project grant and all user grants for this project grant
|
2020-04-23 07:54:40 +02:00
|
|
|
rpc RemoveProjectGrant(ProjectGrantID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/projects/{project_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "project.grant.delete"
|
|
|
|
};
|
|
|
|
}
|
2020-03-23 10:50:40 +01:00
|
|
|
|
|
|
|
rpc GetProjectGrantMemberRoles(google.protobuf.Empty) returns (ProjectGrantMemberRoles) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/grants/members/roles"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.member.read"
|
|
|
|
};
|
|
|
|
}
|
2020-06-23 10:09:30 +02:00
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc SearchProjectGrantMembers(ProjectGrantMemberSearchRequest) returns (ProjectGrantMemberSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/grants/{grant_id}/members/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.member.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-23 07:54:40 +02:00
|
|
|
rpc AddProjectGrantMember(ProjectGrantMemberAdd) returns (ProjectGrantMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/grants/{grant_id}/members"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.member.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-23 07:54:40 +02:00
|
|
|
rpc ChangeProjectGrantMember(ProjectGrantMemberChange) returns (ProjectGrantMember) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/grants/{grant_id}/members/{user_id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.member.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc RemoveProjectGrantMember(ProjectGrantMemberRemove) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.member.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc SearchUserGrants(UserGrantSearchRequest) returns (UserGrantSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users/grants/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc UserGrantByID(UserGrantID) returns (UserGrantView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/users/{user_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.read"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc CreateUserGrant(UserGrantCreate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/users/{user_id}/grants"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc UpdateUserGrant(UserGrantUpdate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{user_id}/grants/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc DeactivateUserGrant(UserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{user_id}/grants/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
rpc ReactivateUserGrant(UserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/users/{user_id}/grants/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-05-11 10:16:27 +02:00
|
|
|
rpc RemoveUserGrant(UserGrantID) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/users/{user_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "user.grant.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// add a list of user grants in one request
|
2020-06-19 15:32:03 +02:00
|
|
|
rpc BulkCreateUserGrant(UserGrantCreateBulk) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/usergrants/_bulk"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// update a list of user grants in one request
|
2020-06-19 15:32:03 +02:00
|
|
|
rpc BulkUpdateUserGrant(UserGrantUpdateBulk) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/usergrants/_bulk"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "user.grant.write"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// remove a list of user grants in one request
|
2020-06-19 15:32:03 +02:00
|
|
|
rpc BulkRemoveUserGrant(UserGrantRemoveBulk) returns (google.protobuf.Empty) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
delete: "/usersgrants/_bulk"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
|
|
permission: "user.grant.delete"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// search user grants based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc SearchProjectUserGrants(ProjectUserGrantSearchRequest) returns (UserGrantSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/users/grants/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// get user grant based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc ProjectUserGrantByID(ProjectUserGrantID) returns (UserGrantView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projects/{project_id}/users/{user_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.read"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// create user grant based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc CreateProjectUserGrant(UserGrantCreate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projects/{project_id}/users/{user_id}/grants"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// update user grant based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc UpdateProjectUserGrant(ProjectUserGrantUpdate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/users/{user_id}/grants/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// deactivate user grant based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc DeactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// reactivate user grant based on a project
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc ReactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.user.grant.write"
|
|
|
|
check_field_name: "ProjectId"
|
|
|
|
};
|
|
|
|
}
|
2020-06-23 10:09:30 +02:00
|
|
|
|
|
|
|
// search user grants based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc SearchProjectGrantUserGrants(ProjectGrantUserGrantSearchRequest) returns (UserGrantSearchResponse) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projectgrants/{project_grant_id}/users/grants/_search"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.read"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// get user grant based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-06-23 07:06:07 +02:00
|
|
|
rpc ProjectGrantUserGrantByID(ProjectGrantUserGrantID) returns (UserGrantView) {
|
2020-03-23 10:50:40 +01:00
|
|
|
option (google.api.http) = {
|
|
|
|
get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.read"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// create user grant based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc CreateProjectGrantUserGrant(ProjectGrantUserGrantCreate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
post: "/projectgrants/{project_grant_id}/users/{user_id}/grants"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.write"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// update user grant based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc UpdateProjectGrantUserGrant(ProjectGrantUserGrantUpdate) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.write"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// deactivate user grant based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc DeactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.write"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
// reactivate user grant based on a projectgrant
|
|
|
|
// This request is required that the user authorizations of zitadel can be differentiated
|
2020-03-23 10:50:40 +01:00
|
|
|
rpc ReactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) {
|
|
|
|
option (google.api.http) = {
|
|
|
|
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate"
|
|
|
|
body: "*"
|
|
|
|
};
|
|
|
|
|
2020-03-23 12:25:16 +01:00
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
2020-03-23 10:50:40 +01:00
|
|
|
permission: "project.grant.user.grant.write"
|
|
|
|
check_field_name: "ProjectGrantId"
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
message Iam {
|
|
|
|
string global_org_id = 1;
|
|
|
|
string iam_project_id = 2;
|
|
|
|
bool set_up_done = 3;
|
|
|
|
bool set_up_started = 4;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ChangeRequest {
|
|
|
|
string id = 1;
|
2020-06-15 16:50:09 +02:00
|
|
|
string sec_id = 2;
|
|
|
|
uint64 limit= 3;
|
|
|
|
uint64 sequence_offset = 4;
|
2020-06-25 11:25:38 +02:00
|
|
|
bool asc = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message Changes {
|
|
|
|
repeated Change changes = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message Change {
|
|
|
|
google.protobuf.Timestamp change_date = 1;
|
|
|
|
string event_type = 2;
|
|
|
|
uint64 sequence = 3;
|
2020-06-29 09:37:10 +02:00
|
|
|
string editor_id = 4;
|
|
|
|
string editor = 5;
|
|
|
|
google.protobuf.Struct data = 6;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ApplicationID {
|
|
|
|
string id = 1;
|
|
|
|
string project_id = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
message Email {
|
2020-03-23 10:50:40 +01:00
|
|
|
string email = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UniqueUserRequest {
|
|
|
|
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message UniqueUserResponse {
|
|
|
|
bool is_unique = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message CreateUserRequest {
|
|
|
|
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
|
2020-06-17 08:06:40 +02:00
|
|
|
string preferred_language = 5[(validate.rules).string = {max_len: 200}];
|
|
|
|
Gender gender = 6;
|
|
|
|
string email = 7 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}];
|
|
|
|
bool is_email_verified = 8;
|
|
|
|
string phone = 9 [(validate.rules).string = {max_len: 20}];
|
|
|
|
bool is_phone_verified = 10;
|
|
|
|
string country = 11 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string locality = 12 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string postal_code = 13 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string region = 14 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string street_address = 15 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string password = 16 [(validate.rules).string = {max_len: 72}];
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message User {
|
2020-05-12 06:30:53 +02:00
|
|
|
string id = 1;
|
|
|
|
UserState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
string user_name = 5;
|
|
|
|
string first_name = 6;
|
|
|
|
string last_name = 7;
|
|
|
|
string display_name = 8;
|
|
|
|
string nick_name = 9;
|
|
|
|
string preferred_language = 10;
|
|
|
|
Gender gender = 11;
|
|
|
|
string email = 12;
|
|
|
|
bool is_email_verified = 13;
|
|
|
|
string phone = 14;
|
|
|
|
bool is_phone_verified = 15;
|
|
|
|
string country = 16;
|
|
|
|
string locality = 17;
|
|
|
|
string postal_code = 18;
|
|
|
|
string region = 19;
|
|
|
|
string street_address = 20;
|
|
|
|
uint64 sequence = 21;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum UserState {
|
|
|
|
USERSTATE_UNSPECIFIED = 0;
|
|
|
|
USERSTATE_ACTIVE = 1;
|
|
|
|
USERSTATE_INACTIVE = 2;
|
|
|
|
USERSTATE_DELETED = 3;
|
|
|
|
USERSTATE_LOCKED = 4;
|
|
|
|
USERSTATE_SUSPEND = 5;
|
|
|
|
USERSTATE_INITIAL= 6;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum Gender {
|
|
|
|
GENDER_UNSPECIFIED = 0;
|
|
|
|
GENDER_FEMALE = 1;
|
|
|
|
GENDER_MALE = 2;
|
|
|
|
GENDER_DIVERSE = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserView {
|
2020-03-23 10:50:40 +01:00
|
|
|
string id = 1;
|
|
|
|
UserState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
google.protobuf.Timestamp last_login = 5;
|
|
|
|
google.protobuf.Timestamp password_changed = 6;
|
|
|
|
string user_name = 7;
|
|
|
|
string first_name = 8;
|
|
|
|
string last_name = 9;
|
|
|
|
string display_name = 10;
|
|
|
|
string nick_name = 11;
|
|
|
|
string preferred_language = 12;
|
|
|
|
Gender gender = 13;
|
|
|
|
string email = 14;
|
|
|
|
bool is_email_verified = 15;
|
|
|
|
string phone = 16;
|
|
|
|
bool is_phone_verified = 17;
|
|
|
|
string country = 18;
|
|
|
|
string locality = 19;
|
|
|
|
string postal_code = 20;
|
|
|
|
string region = 21;
|
|
|
|
string street_address = 22;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 23;
|
2020-05-12 06:30:53 +02:00
|
|
|
string resource_owner = 24;
|
2020-06-17 07:25:04 +02:00
|
|
|
repeated string login_names = 25;
|
2020-06-17 16:43:53 +02:00
|
|
|
string preferred_login_name = 26;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message UserSearchRequest {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
UserSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];;
|
|
|
|
bool asc = 4;
|
|
|
|
repeated UserSearchQuery queries = 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserSearchQuery {
|
|
|
|
UserSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];;
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum UserSearchKey {
|
|
|
|
USERSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
USERSEARCHKEY_USER_NAME = 1;
|
|
|
|
USERSEARCHKEY_FIRST_NAME = 2;
|
|
|
|
USERSEARCHKEY_LAST_NAME = 3;
|
|
|
|
USERSEARCHKEY_NICK_NAME = 4;
|
|
|
|
USERSEARCHKEY_DISPLAY_NAME = 5;
|
|
|
|
USERSEARCHKEY_EMAIL = 6;
|
|
|
|
USERSEARCHKEY_STATE = 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-12 06:30:53 +02:00
|
|
|
repeated UserView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum SearchMethod {
|
|
|
|
SEARCHMETHOD_EQUALS = 0;
|
|
|
|
SEARCHMETHOD_STARTS_WITH = 1;
|
|
|
|
SEARCHMETHOD_CONTAINS = 2;
|
2020-05-11 12:16:29 +02:00
|
|
|
SEARCHMETHOD_EQUALS_IGNORE_CASE = 3;
|
|
|
|
SEARCHMETHOD_STARTS_WITH_IGNORE_CASE = 4;
|
|
|
|
SEARCHMETHOD_CONTAINS_IGNORE_CASE = 5;
|
2020-06-19 15:32:03 +02:00
|
|
|
SEARCHMETHOD_NOT_EQUALS = 6;
|
|
|
|
SEARCHMETHOD_GREATER_THAN = 7;
|
|
|
|
SEARCHMETHOD_LESS_THAN = 8;
|
|
|
|
SEARCHMETHOD_IS_ONE_OF = 9;
|
|
|
|
SEARCHMETHOD_LIST_CONTAINS = 10;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message UserProfile {
|
|
|
|
string id = 1;
|
2020-05-11 10:16:27 +02:00
|
|
|
string first_name = 2;
|
|
|
|
string last_name = 3;
|
|
|
|
string nick_name = 4;
|
|
|
|
string display_name = 5;
|
|
|
|
string preferred_language = 6;
|
|
|
|
Gender gender = 7;
|
|
|
|
string user_name = 8;
|
|
|
|
uint64 sequence = 9;
|
|
|
|
google.protobuf.Timestamp creation_date = 10;
|
|
|
|
google.protobuf.Timestamp change_date = 11;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
message UserProfileView {
|
|
|
|
string id = 1;
|
|
|
|
string first_name = 2;
|
|
|
|
string last_name = 3;
|
|
|
|
string nick_name = 4;
|
|
|
|
string display_name = 5;
|
|
|
|
string preferred_language = 6;
|
|
|
|
Gender gender = 7;
|
|
|
|
string user_name = 8;
|
|
|
|
uint64 sequence = 9;
|
|
|
|
google.protobuf.Timestamp creation_date = 10;
|
|
|
|
google.protobuf.Timestamp change_date = 11;
|
|
|
|
repeated string login_names = 12;
|
|
|
|
string preferred_login_name = 27;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UpdateUserProfileRequest {
|
|
|
|
string id = 1;
|
|
|
|
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
|
2020-06-17 08:06:40 +02:00
|
|
|
string preferred_language = 5 [(validate.rules).string = {max_len: 200}];
|
|
|
|
Gender gender = 6;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message UserEmail {
|
|
|
|
string id = 1;
|
|
|
|
string email = 2;
|
|
|
|
bool is_email_verified = 3;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 4;
|
2020-05-11 10:16:27 +02:00
|
|
|
google.protobuf.Timestamp creation_date = 5;
|
|
|
|
google.protobuf.Timestamp change_date = 6;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
message UserEmailView {
|
|
|
|
string id = 1;
|
|
|
|
string email = 2;
|
|
|
|
bool is_email_verified = 3;
|
|
|
|
uint64 sequence = 4;
|
|
|
|
google.protobuf.Timestamp creation_date = 5;
|
|
|
|
google.protobuf.Timestamp change_date = 6;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UpdateUserEmailRequest {
|
|
|
|
string id = 1;
|
|
|
|
string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
bool is_email_verified = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserPhone {
|
|
|
|
string id = 1;
|
|
|
|
string phone = 2;
|
|
|
|
bool is_phone_verified = 3;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 5;
|
2020-05-11 10:16:27 +02:00
|
|
|
google.protobuf.Timestamp creation_date = 6;
|
|
|
|
google.protobuf.Timestamp change_date = 7;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
message UserPhoneView {
|
|
|
|
string id = 1;
|
|
|
|
string phone = 2;
|
|
|
|
bool is_phone_verified = 3;
|
|
|
|
uint64 sequence = 5;
|
|
|
|
google.protobuf.Timestamp creation_date = 6;
|
|
|
|
google.protobuf.Timestamp change_date = 7;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UpdateUserPhoneRequest {
|
|
|
|
string id = 1;
|
|
|
|
string phone = 2 [(validate.rules).string = {min_len: 1, max_len: 20}];
|
|
|
|
bool is_phone_verified = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message UserAddress {
|
|
|
|
string id = 1;
|
|
|
|
string country = 2;
|
|
|
|
string locality = 3;
|
|
|
|
string postal_code = 4;
|
|
|
|
string region = 5;
|
|
|
|
string street_address = 6;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 7;
|
2020-05-11 10:16:27 +02:00
|
|
|
google.protobuf.Timestamp creation_date = 8;
|
|
|
|
google.protobuf.Timestamp change_date = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-17 07:25:04 +02:00
|
|
|
message UserAddressView {
|
|
|
|
string id = 1;
|
|
|
|
string country = 2;
|
|
|
|
string locality = 3;
|
|
|
|
string postal_code = 4;
|
|
|
|
string region = 5;
|
|
|
|
string street_address = 6;
|
|
|
|
uint64 sequence = 7;
|
|
|
|
google.protobuf.Timestamp creation_date = 8;
|
|
|
|
google.protobuf.Timestamp change_date = 9;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UpdateUserAddressRequest {
|
|
|
|
string id = 1;
|
|
|
|
string country = 2 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string locality = 3 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string postal_code = 4 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string region = 5 [(validate.rules).string = {max_len: 200}];
|
|
|
|
string street_address = 6 [(validate.rules).string = {max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message MultiFactors {
|
|
|
|
repeated MultiFactor mfas = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message MultiFactor {
|
|
|
|
MfaType type = 1;
|
|
|
|
MFAState state = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum MfaType {
|
|
|
|
MFATYPE_UNSPECIFIED = 0;
|
|
|
|
MFATYPE_SMS = 1;
|
|
|
|
MFATYPE_OTP = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum MFAState {
|
|
|
|
MFASTATE_UNSPECIFIED = 0;
|
|
|
|
MFASTATE_NOT_READY = 1;
|
|
|
|
MFASTATE_READY = 2;
|
|
|
|
MFASTATE_REMOVED = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordID{
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordRequest {
|
|
|
|
string id = 1;
|
|
|
|
string password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message ResetPasswordRequest {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message SetPasswordNotificationRequest {
|
|
|
|
string id = 1;
|
|
|
|
NotificationType type = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum NotificationType {
|
|
|
|
NOTIFICATIONTYPE_EMAIL = 0;
|
|
|
|
NOTIFICATIONTYPE_SMS = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordComplexityPolicyID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordComplexityPolicy {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2;
|
|
|
|
PolicyState state = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
google.protobuf.Timestamp change_date = 5;
|
|
|
|
uint64 min_length = 6;
|
|
|
|
bool has_lowercase = 7;
|
|
|
|
bool has_uppercase = 8;
|
|
|
|
bool has_number = 9;
|
|
|
|
bool has_symbol = 10;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 11;
|
2020-05-14 11:48:57 +02:00
|
|
|
bool is_default = 12;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordComplexityPolicyCreate {
|
|
|
|
string description = 1 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 min_length = 2;
|
|
|
|
bool has_lowercase = 3;
|
|
|
|
bool has_uppercase = 4;
|
|
|
|
bool has_number = 5;
|
|
|
|
bool has_symbol = 6;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordComplexityPolicyUpdate {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 min_length = 3;
|
|
|
|
bool has_lowercase = 4;
|
|
|
|
bool has_uppercase = 5;
|
|
|
|
bool has_number = 6;
|
|
|
|
bool has_symbol = 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordAgePolicyID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordAgePolicy {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2;
|
|
|
|
PolicyState state = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
google.protobuf.Timestamp change_date = 5;
|
|
|
|
uint64 max_age_days = 6;
|
|
|
|
uint64 expire_warn_days = 7;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 8;
|
2020-05-14 11:48:57 +02:00
|
|
|
bool is_default = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordAgePolicyCreate {
|
|
|
|
string description = 1 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 max_age_days = 2;
|
|
|
|
uint64 expire_warn_days = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordAgePolicyUpdate {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 max_age_days = 3;
|
|
|
|
uint64 expire_warn_days = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordLockoutPolicyID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordLockoutPolicy {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2;
|
|
|
|
PolicyState state = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
google.protobuf.Timestamp change_date = 5;
|
|
|
|
uint64 max_attempts = 6;
|
|
|
|
bool show_lock_out_failures = 7;
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 8;
|
2020-05-14 11:48:57 +02:00
|
|
|
bool is_default = 9
|
|
|
|
;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordLockoutPolicyCreate {
|
|
|
|
string description = 1 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 max_attempts = 2;
|
|
|
|
bool show_lock_out_failures = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message PasswordLockoutPolicyUpdate {
|
|
|
|
string id = 1;
|
|
|
|
string description = 2 [(validate.rules).string = {max_len: 500}];
|
|
|
|
uint64 max_attempts = 3;
|
|
|
|
bool show_lock_out_failures = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum PolicyState {
|
|
|
|
POLICYSTATE_UNSPECIFIED = 0;
|
|
|
|
POLICYSTATE_ACTIVE = 1;
|
|
|
|
POLICYSTATE_INACTIVE = 2;
|
|
|
|
POLICYSTATE_DELETED = 3;
|
|
|
|
}
|
|
|
|
|
2020-06-19 07:27:16 +02:00
|
|
|
message OrgIamPolicy {
|
|
|
|
string org_id = 1;
|
|
|
|
string description = 2;
|
|
|
|
bool user_login_must_be_domain = 3;
|
|
|
|
bool default = 4;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message OrgID {
|
|
|
|
string id = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message Org {
|
|
|
|
string id = 1;
|
|
|
|
OrgState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
string name = 5;
|
2020-06-16 11:40:18 +02:00
|
|
|
uint64 sequence = 6;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-23 07:06:07 +02:00
|
|
|
message OrgView {
|
|
|
|
string id = 1;
|
|
|
|
OrgState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
string name = 5;
|
|
|
|
uint64 sequence = 6;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
enum OrgState {
|
|
|
|
ORGSTATE_UNSPECIFIED = 0;
|
|
|
|
ORGSTATE_ACTIVE = 1;
|
|
|
|
ORGSTATE_INACTIVE = 2;
|
|
|
|
}
|
|
|
|
|
2020-06-23 10:09:30 +02:00
|
|
|
message Domain {
|
|
|
|
string domain = 1;
|
|
|
|
}
|
|
|
|
|
2020-06-16 11:40:18 +02:00
|
|
|
message OrgDomains {
|
|
|
|
repeated OrgDomain domains = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgDomain {
|
|
|
|
string org_id = 1;
|
|
|
|
google.protobuf.Timestamp creation_date = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
string domain = 4;
|
|
|
|
bool verified = 5;
|
|
|
|
bool primary = 6;
|
|
|
|
uint64 sequence = 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgDomainView {
|
|
|
|
string org_id = 1;
|
|
|
|
google.protobuf.Timestamp creation_date = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
string domain = 4;
|
|
|
|
bool verified = 5;
|
|
|
|
bool primary = 6;
|
|
|
|
uint64 sequence = 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
message AddOrgDomainRequest {
|
|
|
|
string domain = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message RemoveOrgDomainRequest {
|
|
|
|
string domain = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgDomainSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
|
|
|
repeated OrgDomainView result = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgDomainSearchRequest {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
repeated OrgDomainSearchQuery queries = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgDomainSearchQuery {
|
|
|
|
OrgDomainSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum OrgDomainSearchKey {
|
|
|
|
ORGDOMAINSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
ORGDOMAINSEARCHKEY_DOMAIN = 1;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message OrgMemberRoles {
|
|
|
|
repeated string roles = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgMember {
|
|
|
|
string user_id = 1;
|
2020-05-13 14:22:29 +02:00
|
|
|
repeated string roles = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
uint64 sequence = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message AddOrgMemberRequest {
|
2020-06-10 10:47:50 +02:00
|
|
|
string user_id = 1;
|
|
|
|
repeated string roles = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ChangeOrgMemberRequest {
|
2020-06-10 10:47:50 +02:00
|
|
|
string user_id = 1;
|
|
|
|
repeated string roles = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message RemoveOrgMemberRequest {
|
2020-06-10 10:47:50 +02:00
|
|
|
string user_id = 1;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message OrgMemberSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-06-10 10:47:50 +02:00
|
|
|
repeated OrgMemberView result = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OrgMemberView {
|
|
|
|
string user_id = 1;
|
|
|
|
repeated string roles = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
uint64 sequence = 5;
|
|
|
|
string user_name = 6;
|
|
|
|
string email = 7;
|
|
|
|
string first_name = 8;
|
|
|
|
string last_name = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message OrgMemberSearchRequest {
|
2020-06-10 10:47:50 +02:00
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
repeated OrgMemberSearchQuery queries = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message OrgMemberSearchQuery {
|
|
|
|
OrgMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum OrgMemberSearchKey {
|
|
|
|
ORGMEMBERSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
ORGMEMBERSEARCHKEY_FIRST_NAME = 1;
|
|
|
|
ORGMEMBERSEARCHKEY_LAST_NAME = 2;
|
|
|
|
ORGMEMBERSEARCHKEY_EMAIL = 3;
|
|
|
|
ORGMEMBERSEARCHKEY_USER_ID = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectCreateRequest {
|
|
|
|
string name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectUpdateRequest {
|
|
|
|
string id = 1;
|
|
|
|
string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
message ProjectSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
|
|
|
repeated ProjectView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
message ProjectView {
|
|
|
|
string project_id = 1;
|
2020-03-23 10:50:40 +01:00
|
|
|
string name = 2;
|
|
|
|
ProjectState state = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
google.protobuf.Timestamp creation_date = 5;
|
2020-06-15 14:50:39 +02:00
|
|
|
string resource_owner = 6;
|
|
|
|
uint64 sequence = 7;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
|
|
|
|
message ProjectSearchRequest {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
repeated ProjectSearchQuery queries = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
message ProjectSearchQuery {
|
|
|
|
ProjectSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
enum ProjectSearchKey {
|
|
|
|
PROJECTSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
PROJECTSEARCHKEY_PROJECT_NAME = 1;
|
2020-05-11 12:16:29 +02:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
message Projects {
|
|
|
|
repeated Project projects = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message Project {
|
2020-05-11 12:16:29 +02:00
|
|
|
string id = 1;
|
|
|
|
string name = 2;
|
|
|
|
ProjectState state = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
google.protobuf.Timestamp creation_date = 5;
|
2020-06-15 14:50:39 +02:00
|
|
|
uint64 sequence = 6;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
enum ProjectState {
|
|
|
|
PROJECTSTATE_UNSPECIFIED = 0;
|
|
|
|
PROJECTSTATE_ACTIVE = 1;
|
|
|
|
PROJECTSTATE_INACTIVE = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:50:39 +02:00
|
|
|
enum ProjectType {
|
|
|
|
PROJECTTYPE_UNSPECIFIED = 0;
|
|
|
|
PROJECTTYPE_OWNED = 1;
|
|
|
|
PROJECTTYPE_GRANTED = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberRoles {
|
|
|
|
repeated string roles = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMember {
|
|
|
|
string user_id = 1;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated string roles = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
uint64 sequence = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberAdd {
|
|
|
|
string id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
repeated string roles = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberChange {
|
|
|
|
string id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
repeated string roles = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberRemove {
|
|
|
|
string id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectRoleAdd {
|
2020-04-21 17:00:32 +02:00
|
|
|
string id = 1;
|
|
|
|
string key = 2;
|
|
|
|
string display_name = 3;
|
|
|
|
string group = 4;
|
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message ProjectRoleAddBulk {
|
|
|
|
string id = 1;
|
|
|
|
repeated ProjectRoleAdd project_roles = 2;
|
|
|
|
}
|
|
|
|
|
2020-04-21 17:00:32 +02:00
|
|
|
message ProjectRoleChange {
|
2020-03-23 10:50:40 +01:00
|
|
|
string id = 1;
|
2020-04-21 17:00:32 +02:00
|
|
|
string key = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
string display_name = 3;
|
|
|
|
string group = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectRole {
|
|
|
|
string project_id = 1;
|
2020-04-21 17:00:32 +02:00
|
|
|
string key = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
string display_name = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
2020-04-21 17:00:32 +02:00
|
|
|
google.protobuf.Timestamp change_date = 5;
|
|
|
|
string group = 6;
|
|
|
|
uint64 sequence = 7;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-05-11 12:16:29 +02:00
|
|
|
message ProjectRoleView {
|
|
|
|
string project_id = 1;
|
|
|
|
string key = 2;
|
|
|
|
string display_name = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
string group = 6;
|
|
|
|
uint64 sequence = 7;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectRoleRemove {
|
|
|
|
string id = 1;
|
2020-04-21 17:00:32 +02:00
|
|
|
string key = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectRoleSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated ProjectRoleView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectRoleSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
repeated ProjectRoleSearchQuery queries = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectRoleSearchQuery {
|
|
|
|
ProjectRoleSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ProjectRoleSearchKey {
|
|
|
|
PROJECTROLESEARCHKEY_UNSPECIFIED = 0;
|
2020-04-21 17:00:32 +02:00
|
|
|
PROJECTROLESEARCHKEY_KEY = 1;
|
2020-03-23 10:50:40 +01:00
|
|
|
PROJECTROLESEARCHKEY_DISPLAY_NAME = 2;
|
|
|
|
}
|
|
|
|
|
2020-05-11 12:16:29 +02:00
|
|
|
message ProjectMemberView {
|
|
|
|
string user_id = 1;
|
|
|
|
string user_name = 2;
|
|
|
|
string email = 3;
|
|
|
|
string first_name = 4;
|
|
|
|
string last_name = 5;
|
|
|
|
repeated string roles = 6;
|
|
|
|
google.protobuf.Timestamp change_date = 7;
|
|
|
|
google.protobuf.Timestamp creation_date = 8;
|
|
|
|
uint64 sequence = 10;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectMemberSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated ProjectMemberView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
repeated ProjectMemberSearchQuery queries = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectMemberSearchQuery {
|
|
|
|
ProjectMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ProjectMemberSearchKey {
|
|
|
|
PROJECTMEMBERSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
PROJECTMEMBERSEARCHKEY_FIRST_NAME = 1;
|
|
|
|
PROJECTMEMBERSEARCHKEY_LAST_NAME = 2;
|
|
|
|
PROJECTMEMBERSEARCHKEY_EMAIL = 3;
|
|
|
|
PROJECTMEMBERSEARCHKEY_USER_ID = 4;
|
2020-05-11 12:16:29 +02:00
|
|
|
PROJECTMEMBERSEARCHKEY_USER_NAME = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum AppState {
|
|
|
|
APPSTATE_UNSPECIFIED = 0;
|
|
|
|
APPSTATE_ACTIVE = 1;
|
|
|
|
APPSTATE_INACTIVE = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
message Application {
|
|
|
|
string id = 1;
|
|
|
|
AppState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
string name = 5;
|
|
|
|
oneof app_config {
|
|
|
|
OIDCConfig oidc_config = 8;
|
|
|
|
}
|
2020-04-07 13:23:04 +02:00
|
|
|
uint64 sequence = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ApplicationUpdate {
|
|
|
|
string project_id = 1;
|
|
|
|
string id = 2;
|
|
|
|
string name = 5 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
}
|
|
|
|
|
|
|
|
message OIDCConfig {
|
|
|
|
repeated string redirect_uris = 1;
|
|
|
|
repeated OIDCResponseType response_types = 2;
|
|
|
|
repeated OIDCGrantType grant_types = 3;
|
|
|
|
OIDCApplicationType application_type = 4;
|
|
|
|
string client_id = 5;
|
|
|
|
string client_secret = 6;
|
|
|
|
OIDCAuthMethodType auth_method_type = 7;
|
|
|
|
repeated string post_logout_redirect_uris = 8;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OIDCApplicationCreate {
|
|
|
|
string project_id = 1;
|
|
|
|
string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
|
|
repeated string redirect_uris = 3;
|
|
|
|
repeated OIDCResponseType response_types = 4;
|
|
|
|
repeated OIDCGrantType grant_types = 5;
|
|
|
|
OIDCApplicationType application_type = 6;
|
|
|
|
OIDCAuthMethodType auth_method_type = 7;
|
|
|
|
repeated string post_logout_redirect_uris = 8;
|
|
|
|
}
|
|
|
|
|
|
|
|
message OIDCConfigUpdate {
|
|
|
|
string project_id = 1;
|
|
|
|
string application_id = 2;
|
|
|
|
repeated string redirect_uris = 3;
|
|
|
|
repeated OIDCResponseType response_types = 4;
|
|
|
|
repeated OIDCGrantType grant_types = 5;
|
|
|
|
OIDCApplicationType application_type = 6;
|
|
|
|
OIDCAuthMethodType auth_method_type = 7;
|
|
|
|
repeated string post_logout_redirect_uris = 8;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum OIDCResponseType {
|
|
|
|
OIDCRESPONSETYPE_CODE = 0;
|
|
|
|
OIDCRESPONSETYPE_ID_TOKEN = 1;
|
2020-04-21 17:00:32 +02:00
|
|
|
OIDCRESPONSETYPE_TOKEN = 2;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum OIDCGrantType {
|
|
|
|
OIDCGRANTTYPE_AUTHORIZATION_CODE = 0;
|
|
|
|
OIDCGRANTTYPE_IMPLICIT = 1;
|
|
|
|
OIDCGRANTTYPE_REFRESH_TOKEN = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum OIDCApplicationType {
|
|
|
|
OIDCAPPLICATIONTYPE_WEB = 0;
|
|
|
|
OIDCAPPLICATIONTYPE_USER_AGENT = 1;
|
|
|
|
OIDCAPPLICATIONTYPE_NATIVE = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum OIDCAuthMethodType {
|
|
|
|
OIDCAUTHMETHODTYPE_BASIC = 0;
|
|
|
|
OIDCAUTHMETHODTYPE_POST = 1;
|
|
|
|
OIDCAUTHMETHODTYPE_NONE = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ClientSecret {
|
|
|
|
string client_secret = 1;
|
|
|
|
}
|
|
|
|
|
2020-05-11 12:16:29 +02:00
|
|
|
message ApplicationView {
|
|
|
|
string id = 1;
|
|
|
|
AppState state = 2;
|
|
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
|
|
google.protobuf.Timestamp change_date = 4;
|
|
|
|
string name = 5;
|
|
|
|
oneof app_config {
|
|
|
|
OIDCConfig oidc_config = 8;
|
|
|
|
}
|
|
|
|
uint64 sequence = 9;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ApplicationSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated ApplicationView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ApplicationSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
repeated ApplicationSearchQuery queries = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ApplicationSearchQuery {
|
|
|
|
ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ApplicationSearchKey {
|
|
|
|
APPLICATIONSERACHKEY_UNSPECIFIED = 0;
|
|
|
|
APPLICATIONSEARCHKEY_APP_NAME = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrant {
|
|
|
|
string id = 1;
|
|
|
|
string project_id = 2;
|
|
|
|
string granted_org_id = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated string role_keys = 4;
|
|
|
|
ProjectGrantState state = 5;
|
|
|
|
google.protobuf.Timestamp creation_date = 6;
|
|
|
|
google.protobuf.Timestamp change_date = 7;
|
|
|
|
uint64 sequence = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantCreate {
|
|
|
|
string project_id = 1;
|
|
|
|
string granted_org_id = 2;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantUpdate {
|
|
|
|
string project_id = 1;
|
|
|
|
string id = 2;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantID {
|
|
|
|
string project_id = 1;
|
|
|
|
string id = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ProjectGrantState {
|
|
|
|
PROJECTGRANTSTATE_UNSPECIFIED = 0;
|
|
|
|
PROJECTGRANTSTATE_ACTIVE = 1;
|
|
|
|
PROJECTGRANTSTATE_INACTIVE = 2;
|
|
|
|
}
|
|
|
|
|
2020-05-11 12:16:29 +02:00
|
|
|
message ProjectGrantView {
|
|
|
|
string id = 1;
|
|
|
|
string project_id = 2;
|
|
|
|
string granted_org_id = 3;
|
|
|
|
string granted_org_name = 4;
|
2020-06-19 15:32:03 +02:00
|
|
|
repeated string role_keys = 5;
|
|
|
|
ProjectGrantState state = 6;
|
|
|
|
google.protobuf.Timestamp creation_date = 7;
|
|
|
|
google.protobuf.Timestamp change_date = 8;
|
|
|
|
string project_name = 9;
|
|
|
|
uint64 sequence = 10;
|
|
|
|
string resource_owner = 11;
|
|
|
|
string resource_owner_name = 12;
|
2020-05-11 12:16:29 +02:00
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectGrantSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated ProjectGrantView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message GrantedProjectSearchRequest {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
repeated ProjectSearchQuery queries = 3;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectGrantSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
2020-06-19 15:32:03 +02:00
|
|
|
repeated ProjectGrantSearchQuery queries = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message ProjectGrantSearchQuery {
|
|
|
|
ProjectGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
2020-06-15 14:50:39 +02:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
enum ProjectGrantSearchKey {
|
|
|
|
PROJECTGRANTSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
PROJECTGRANTSEARCHKEY_PROJECT_NAME = 1;
|
|
|
|
PROJECTGRANTSEARCHKEY_ROLE_KEY = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectGrantMemberRoles {
|
|
|
|
repeated string roles = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMember {
|
|
|
|
string user_id = 1;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated string roles = 2;
|
|
|
|
google.protobuf.Timestamp change_date = 3;
|
|
|
|
google.protobuf.Timestamp creation_date = 4;
|
|
|
|
uint64 sequence = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMemberAdd {
|
|
|
|
string project_id = 1;
|
|
|
|
string grant_id = 2;
|
|
|
|
string user_id = 3;
|
|
|
|
repeated string roles = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMemberChange {
|
|
|
|
string project_id = 1;
|
|
|
|
string grant_id = 2;
|
|
|
|
string user_id = 3;
|
|
|
|
repeated string roles = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMemberRemove {
|
|
|
|
string project_id = 1;
|
|
|
|
string grant_id = 2;
|
|
|
|
string user_id = 3;
|
|
|
|
}
|
|
|
|
|
2020-05-11 12:16:29 +02:00
|
|
|
message ProjectGrantMemberView {
|
|
|
|
string user_id = 1;
|
|
|
|
string user_name = 2;
|
|
|
|
string email = 3;
|
|
|
|
string first_name = 4;
|
|
|
|
string last_name = 5;
|
|
|
|
repeated string roles = 6;
|
|
|
|
google.protobuf.Timestamp change_date = 7;
|
|
|
|
google.protobuf.Timestamp creation_date = 8;
|
|
|
|
uint64 sequence = 9;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message ProjectGrantMemberSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-11 12:16:29 +02:00
|
|
|
repeated ProjectGrantMemberView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMemberSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
string grant_id = 2;
|
|
|
|
uint64 offset = 3;
|
|
|
|
uint64 limit = 4;
|
|
|
|
repeated ProjectGrantMemberSearchQuery queries = 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantMemberSearchQuery {
|
|
|
|
ProjectGrantMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2;
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ProjectGrantMemberSearchKey {
|
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME = 1;
|
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME = 2;
|
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_EMAIL = 3;
|
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_USER_ID = 4;
|
2020-05-11 12:16:29 +02:00
|
|
|
PROJECTGRANTMEMBERSEARCHKEY_USER_NAME = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message UserGrant {
|
|
|
|
string id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string org_id = 3;
|
|
|
|
string project_id = 4;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
UserGrantState state = 6;
|
|
|
|
google.protobuf.Timestamp creation_date = 7;
|
|
|
|
google.protobuf.Timestamp change_date = 8;
|
2020-05-12 06:30:53 +02:00
|
|
|
uint64 sequence = 9;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message UserGrantCreateBulk {
|
|
|
|
repeated UserGrantCreate user_grants = 1;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UserGrantCreate {
|
|
|
|
string user_id = 1;
|
2020-05-11 10:16:27 +02:00
|
|
|
string project_id = 2;
|
|
|
|
repeated string role_keys = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message UserGrantUpdateBulk {
|
|
|
|
repeated UserGrantUpdate user_grants = 1;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UserGrantUpdate {
|
|
|
|
string user_id = 1;
|
|
|
|
string id = 2;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 3;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
2020-06-19 15:32:03 +02:00
|
|
|
message UserGrantRemoveBulk {
|
|
|
|
repeated string ids = 1;
|
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
message UserGrantID {
|
|
|
|
string user_id = 1;
|
|
|
|
string id = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectUserGrantID {
|
|
|
|
string project_id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string id = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectUserGrantUpdate {
|
|
|
|
string project_id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string id = 3;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantUserGrantID {
|
|
|
|
string project_grant_id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string id = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantUserGrantCreate {
|
|
|
|
string user_id = 1;
|
|
|
|
string org_id = 2;
|
|
|
|
string project_grant_id = 3;
|
|
|
|
string project_id = 4 [(validate.rules).string.min_len = 1];
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 5;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantUserGrantUpdate {
|
|
|
|
string project_grant_id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string id = 3;
|
2020-04-23 07:54:40 +02:00
|
|
|
repeated string role_keys = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum UserGrantState {
|
|
|
|
USERGRANTSTATE_UNSPECIFIED = 0;
|
|
|
|
USERGRANTSTATE_ACTIVE = 1;
|
|
|
|
USERGRANTSTATE_INACTIVE = 2;
|
|
|
|
}
|
|
|
|
|
2020-05-12 06:30:53 +02:00
|
|
|
message UserGrantView {
|
|
|
|
string id = 1;
|
|
|
|
string user_id = 2;
|
|
|
|
string org_id = 3;
|
|
|
|
string project_id = 4;
|
|
|
|
repeated string role_keys = 5;
|
|
|
|
UserGrantState state = 6;
|
|
|
|
google.protobuf.Timestamp creation_date = 7;
|
|
|
|
google.protobuf.Timestamp change_date = 8;
|
|
|
|
string user_name = 9;
|
|
|
|
string first_name = 10;
|
|
|
|
string last_name = 11;
|
|
|
|
string email = 12;
|
|
|
|
string org_name = 13;
|
|
|
|
string org_domain = 14;
|
|
|
|
string project_name = 15;
|
|
|
|
uint64 sequence = 16;
|
|
|
|
string resource_owner = 17;
|
2020-07-01 12:46:46 +02:00
|
|
|
string display_name = 18;
|
2020-05-12 06:30:53 +02:00
|
|
|
}
|
|
|
|
|
2020-03-23 10:50:40 +01:00
|
|
|
|
|
|
|
message UserGrantSearchResponse {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
uint64 total_result = 3;
|
2020-05-12 06:30:53 +02:00
|
|
|
repeated UserGrantView result = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message UserGrantSearchRequest {
|
|
|
|
uint64 offset = 1;
|
|
|
|
uint64 limit = 2;
|
|
|
|
repeated UserGrantSearchQuery queries = 3;
|
|
|
|
}
|
|
|
|
message UserGrantSearchQuery {
|
|
|
|
UserGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
|
|
|
|
SearchMethod method = 2 [(validate.rules).enum = {in: [0]}];
|
|
|
|
string value = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum UserGrantSearchKey {
|
|
|
|
USERGRANTSEARCHKEY_UNSPECIFIED = 0;
|
|
|
|
USERGRANTSEARCHKEY_PROJECT_ID = 1;
|
|
|
|
USERGRANTSEARCHKEY_USER_ID = 2;
|
|
|
|
USERGRANTSEARCHKEY_ORG_ID = 3;
|
2020-06-19 15:32:03 +02:00
|
|
|
USERGRANTSEARCHKEY_ROLE_KEY = 4;
|
2020-03-23 10:50:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectUserGrantSearchRequest {
|
|
|
|
string project_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
repeated UserGrantSearchQuery queries = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
message ProjectGrantUserGrantSearchRequest {
|
|
|
|
string project_grant_id = 1;
|
|
|
|
uint64 offset = 2;
|
|
|
|
uint64 limit = 3;
|
|
|
|
repeated UserGrantSearchQuery queries = 4;
|
|
|
|
}
|