mirror of
https://github.com/zitadel/zitadel.git
synced 2025-01-05 14:37:45 +00:00
fix: remove unnecessary functions from auth.proto
This commit is contained in:
parent
9900e53afa
commit
52ac0772e3
4
.gitignore
vendored
4
.gitignore
vendored
@ -21,3 +21,7 @@ debug
|
||||
# IDE
|
||||
.idea
|
||||
.vscode
|
||||
|
||||
# credential
|
||||
google-credentials
|
||||
key.json
|
@ -44,20 +44,17 @@ func main() {
|
||||
|
||||
ctx := context.Background()
|
||||
if *managementEnabled {
|
||||
err = management.Start(ctx, conf.Mgmt, conf.AuthZ)
|
||||
logging.Log("MAIN-39Nv5").OnError(err).Fatal("error starting management api")
|
||||
management.Start(ctx, conf.Mgmt, conf.AuthZ)
|
||||
}
|
||||
if *authEnabled {
|
||||
err = auth.Start(ctx, conf.Auth, conf.AuthZ)
|
||||
logging.Log("MAIN-x0nD2").OnError(err).Fatal("error starting auth api")
|
||||
auth.Start(ctx, conf.Auth, conf.AuthZ)
|
||||
}
|
||||
if *loginEnabled {
|
||||
err = login.Start(ctx, conf.Login)
|
||||
logging.Log("MAIN-53RF2").OnError(err).Fatal("error starting login ui")
|
||||
}
|
||||
if *adminEnabled {
|
||||
err = admin.Start(ctx, conf.Admin, conf.AuthZ)
|
||||
logging.Log("MAIN-0na71").OnError(err).Fatal("error starting admin api")
|
||||
admin.Start(ctx, conf.Admin, conf.AuthZ)
|
||||
}
|
||||
if *consoleEnabled {
|
||||
err = console.Start(ctx, conf.Console)
|
||||
|
3
go.mod
3
go.mod
@ -15,7 +15,7 @@ require (
|
||||
github.com/ghodss/yaml v1.0.0
|
||||
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b
|
||||
github.com/golang/mock v1.4.3
|
||||
github.com/golang/protobuf v1.3.5
|
||||
github.com/golang/protobuf v1.4.0-rc.4
|
||||
github.com/google/uuid v1.1.1 // indirect
|
||||
github.com/gorilla/schema v1.1.0
|
||||
github.com/gorilla/securecookie v1.1.1
|
||||
@ -37,5 +37,6 @@ require (
|
||||
google.golang.org/api v0.20.0 // indirect
|
||||
google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c
|
||||
google.golang.org/grpc v1.28.0
|
||||
google.golang.org/protobuf v1.20.1
|
||||
gopkg.in/yaml.v2 v2.2.8 // indirect
|
||||
)
|
||||
|
11
go.sum
11
go.sum
@ -76,6 +76,11 @@ github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5y
|
||||
github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
|
||||
github.com/golang/protobuf v1.3.5 h1:F768QJ1E9tib+q5Sc8MkdJi1RxLTbRcTf8LJV56aRls=
|
||||
github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk=
|
||||
github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
|
||||
github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
|
||||
github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
|
||||
github.com/golang/protobuf v1.4.0-rc.4 h1:+EOh4OY6tjM6ZueeUKinl1f0U2820HzQOuf1iqMnsks=
|
||||
github.com/golang/protobuf v1.4.0-rc.4/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
|
||||
github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||
github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
|
||||
@ -324,6 +329,12 @@ google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8
|
||||
google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
||||
google.golang.org/grpc v1.28.0 h1:bO/TA4OxCOummhSf10siHuG7vJOiwh7SpRpFZDkOgl4=
|
||||
google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60=
|
||||
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
|
||||
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
|
||||
google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
|
||||
google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
|
||||
google.golang.org/protobuf v1.20.1 h1:ESRXHgpUBG5D2I5mmsQIyYxB/tQIZfSZ8wLyFDf/N/U=
|
||||
google.golang.org/protobuf v1.20.1/go.mod h1:KqelGeouBkcbcuB3HCk4/YH2tmNLk6YSWA5LIWeI/lY=
|
||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY=
|
||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||
|
1
google-credentials/.gitignore
vendored
1
google-credentials/.gitignore
vendored
@ -1 +0,0 @@
|
||||
key.json
|
@ -2,8 +2,6 @@ package admin
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/logging"
|
||||
|
||||
app "github.com/caos/zitadel/internal/admin"
|
||||
"github.com/caos/zitadel/internal/api/auth"
|
||||
"github.com/caos/zitadel/pkg/admin/api"
|
||||
@ -14,8 +12,6 @@ type Config struct {
|
||||
API api.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) error {
|
||||
err := api.Start(ctx, config.API)
|
||||
logging.Log("MAIN-lfo5h").OnError(err).Panic("unable to start api")
|
||||
return err
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) {
|
||||
api.Start(ctx, config.API)
|
||||
}
|
||||
|
@ -16,13 +16,10 @@ type Config struct {
|
||||
GRPC grpc_util.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, conf Config) error {
|
||||
api := &API{
|
||||
grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()),
|
||||
gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()),
|
||||
}
|
||||
server.StartServer(ctx, &api.grpcServer)
|
||||
server.StartGateway(ctx, &api.gateway)
|
||||
func Start(ctx context.Context, conf Config) {
|
||||
grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig())
|
||||
grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig())
|
||||
|
||||
return nil
|
||||
server.StartServer(ctx, grpcServer)
|
||||
server.StartGateway(ctx, grpcGateway)
|
||||
}
|
||||
|
@ -8,22 +8,14 @@ import (
|
||||
"github.com/caos/zitadel/pkg/auth/api/grpc"
|
||||
)
|
||||
|
||||
type API struct {
|
||||
grpcServer grpc.Server
|
||||
gateway grpc.Gateway
|
||||
}
|
||||
|
||||
type Config struct {
|
||||
GRPC grpc_util.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, conf Config) error {
|
||||
api := &API{
|
||||
grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()),
|
||||
gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()),
|
||||
}
|
||||
server.StartServer(ctx, &api.grpcServer)
|
||||
server.StartGateway(ctx, &api.gateway)
|
||||
func Start(ctx context.Context, conf Config) {
|
||||
grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig())
|
||||
grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig())
|
||||
|
||||
return nil
|
||||
server.StartServer(ctx, grpcServer)
|
||||
server.StartGateway(ctx, grpcGateway)
|
||||
}
|
||||
|
@ -1,18 +0,0 @@
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/zitadel/internal/errors"
|
||||
)
|
||||
|
||||
func (s *Server) GetApplicationByID(ctx context.Context, request *ApplicationID) (*Application, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-Rfh8e", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) SearchApplications(ctx context.Context, appSearch *ApplicationSearchRequest) (*ApplicationSearchResponse, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-ju8Rd", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) AuthorizeApplication(ctx context.Context, auth *ApplicationAuthorizeRequest) (*Application, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-lo8ws", "Not implemented")
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,34 +0,0 @@
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/zitadel/internal/errors"
|
||||
)
|
||||
|
||||
func (s *Server) CreateAuthSession(ctx context.Context, request *AuthSessionCreation) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dh3Rt", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) GetAuthSession(ctx context.Context, id *AuthSessionID) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56g", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) SelectUser(ctx context.Context, request *SelectUserRequest) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dl5gs", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) VerifyUser(ctx context.Context, request *VerifyUserRequest) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-39dGs", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) VerifyPassword(ctx context.Context, password *VerifyPasswordRequest) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-tu9j2", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) VerifyMfa(ctx context.Context, mfa *VerifyMfaRequest) (_ *AuthSessionResponse, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-oi9GB", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) GetAuthSessionByTokenID(ctx context.Context, id *TokenID) (_ *AuthSessionView, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56z", "Not implemented")
|
||||
}
|
@ -6,10 +6,6 @@ import (
|
||||
"github.com/golang/protobuf/ptypes/empty"
|
||||
)
|
||||
|
||||
func (s *Server) SearchGrant(ctx context.Context, grantSearch *GrantSearchRequest) (*GrantSearchResponse, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-mcn5z", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) SearchMyProjectOrgs(ctx context.Context, request *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-8kdRf", "Not implemented")
|
||||
}
|
||||
|
@ -8,9 +8,9 @@ import (
|
||||
context "context"
|
||||
grpc "github.com/caos/zitadel/pkg/auth/api/grpc"
|
||||
gomock "github.com/golang/mock/gomock"
|
||||
empty "github.com/golang/protobuf/ptypes/empty"
|
||||
struct0 "github.com/golang/protobuf/ptypes/struct"
|
||||
grpc0 "google.golang.org/grpc"
|
||||
emptypb "google.golang.org/protobuf/types/known/emptypb"
|
||||
structpb "google.golang.org/protobuf/types/known/structpb"
|
||||
reflect "reflect"
|
||||
)
|
||||
|
||||
@ -38,7 +38,7 @@ func (m *MockAuthServiceClient) EXPECT() *MockAuthServiceClientMockRecorder {
|
||||
}
|
||||
|
||||
// AddMfaOTP mocks base method
|
||||
func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) {
|
||||
func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -57,35 +57,15 @@ func (mr *MockAuthServiceClientMockRecorder) AddMfaOTP(arg0, arg1 interface{}, a
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).AddMfaOTP), varargs...)
|
||||
}
|
||||
|
||||
// AuthorizeApplication mocks base method
|
||||
func (m *MockAuthServiceClient) AuthorizeApplication(arg0 context.Context, arg1 *grpc.ApplicationAuthorizeRequest, arg2 ...grpc0.CallOption) (*grpc.Application, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "AuthorizeApplication", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.Application)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// AuthorizeApplication indicates an expected call of AuthorizeApplication
|
||||
func (mr *MockAuthServiceClientMockRecorder) AuthorizeApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AuthorizeApplication", reflect.TypeOf((*MockAuthServiceClient)(nil).AuthorizeApplication), varargs...)
|
||||
}
|
||||
|
||||
// ChangeMyPassword mocks base method
|
||||
func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "ChangeMyPassword", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -137,128 +117,8 @@ func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserPhone(arg0, arg1 interf
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserPhone), varargs...)
|
||||
}
|
||||
|
||||
// CreateAuthSession mocks base method
|
||||
func (m *MockAuthServiceClient) CreateAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionCreation, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "CreateAuthSession", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// CreateAuthSession indicates an expected call of CreateAuthSession
|
||||
func (mr *MockAuthServiceClientMockRecorder) CreateAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateAuthSession), varargs...)
|
||||
}
|
||||
|
||||
// CreateToken mocks base method
|
||||
func (m *MockAuthServiceClient) CreateToken(arg0 context.Context, arg1 *grpc.CreateTokenRequest, arg2 ...grpc0.CallOption) (*grpc.Token, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "CreateToken", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.Token)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// CreateToken indicates an expected call of CreateToken
|
||||
func (mr *MockAuthServiceClientMockRecorder) CreateToken(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateToken", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateToken), varargs...)
|
||||
}
|
||||
|
||||
// CreateUserAgent mocks base method
|
||||
func (m *MockAuthServiceClient) CreateUserAgent(arg0 context.Context, arg1 *grpc.UserAgentCreation, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "CreateUserAgent", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UserAgent)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// CreateUserAgent indicates an expected call of CreateUserAgent
|
||||
func (mr *MockAuthServiceClientMockRecorder) CreateUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateUserAgent), varargs...)
|
||||
}
|
||||
|
||||
// GetApplicationByID mocks base method
|
||||
func (m *MockAuthServiceClient) GetApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetApplicationByID", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.Application)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetApplicationByID indicates an expected call of GetApplicationByID
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplicationByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetApplicationByID), varargs...)
|
||||
}
|
||||
|
||||
// GetAuthSession mocks base method
|
||||
func (m *MockAuthServiceClient) GetAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetAuthSession", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetAuthSession indicates an expected call of GetAuthSession
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSession), varargs...)
|
||||
}
|
||||
|
||||
// GetAuthSessionByTokenID mocks base method
|
||||
func (m *MockAuthServiceClient) GetAuthSessionByTokenID(arg0 context.Context, arg1 *grpc.TokenID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionView, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetAuthSessionByTokenID", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionView)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetAuthSessionByTokenID indicates an expected call of GetAuthSessionByTokenID
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetAuthSessionByTokenID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSessionByTokenID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSessionByTokenID), varargs...)
|
||||
}
|
||||
|
||||
// GetMyMfas mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) {
|
||||
func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -278,7 +138,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyMfas(arg0, arg1 interface{}, a
|
||||
}
|
||||
|
||||
// GetMyUserAddress mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) {
|
||||
func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -298,7 +158,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserAddress(arg0, arg1 interfa
|
||||
}
|
||||
|
||||
// GetMyUserEmail mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) {
|
||||
func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -318,7 +178,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserEmail(arg0, arg1 interface
|
||||
}
|
||||
|
||||
// GetMyUserPhone mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) {
|
||||
func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -338,7 +198,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserPhone(arg0, arg1 interface
|
||||
}
|
||||
|
||||
// GetMyUserProfile mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) {
|
||||
func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -358,7 +218,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserProfile(arg0, arg1 interfa
|
||||
}
|
||||
|
||||
// GetMyUserSessions mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) {
|
||||
func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -378,7 +238,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserSessions(arg0, arg1 interf
|
||||
}
|
||||
|
||||
// GetMyZitadelPermissions mocks base method
|
||||
func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) {
|
||||
func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -397,46 +257,6 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...)
|
||||
}
|
||||
|
||||
// GetUserAgent mocks base method
|
||||
func (m *MockAuthServiceClient) GetUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetUserAgent", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UserAgent)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetUserAgent indicates an expected call of GetUserAgent
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgent), varargs...)
|
||||
}
|
||||
|
||||
// GetUserAgentSessions mocks base method
|
||||
func (m *MockAuthServiceClient) GetUserAgentSessions(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserSessions, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetUserAgentSessions", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UserSessions)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetUserAgentSessions indicates an expected call of GetUserAgentSessions
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetUserAgentSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgentSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgentSessions), varargs...)
|
||||
}
|
||||
|
||||
// GetUserByID mocks base method
|
||||
func (m *MockAuthServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) {
|
||||
m.ctrl.T.Helper()
|
||||
@ -457,35 +277,15 @@ func (mr *MockAuthServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{},
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserByID), varargs...)
|
||||
}
|
||||
|
||||
// GetUserSession mocks base method
|
||||
func (m *MockAuthServiceClient) GetUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*grpc.UserSession, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetUserSession", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UserSession)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetUserSession indicates an expected call of GetUserSession
|
||||
func (mr *MockAuthServiceClientMockRecorder) GetUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserSession), varargs...)
|
||||
}
|
||||
|
||||
// Healthz mocks base method
|
||||
func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Healthz", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -498,7 +298,7 @@ func (mr *MockAuthServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg
|
||||
}
|
||||
|
||||
// IsIamAdmin mocks base method
|
||||
func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) {
|
||||
func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
@ -517,55 +317,15 @@ func (mr *MockAuthServiceClientMockRecorder) IsIamAdmin(arg0, arg1 interface{},
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsIamAdmin", reflect.TypeOf((*MockAuthServiceClient)(nil).IsIamAdmin), varargs...)
|
||||
}
|
||||
|
||||
// IsUserUnique mocks base method
|
||||
func (m *MockAuthServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "IsUserUnique", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UniqueUserResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// IsUserUnique indicates an expected call of IsUserUnique
|
||||
func (mr *MockAuthServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockAuthServiceClient)(nil).IsUserUnique), varargs...)
|
||||
}
|
||||
|
||||
// PasswordReset mocks base method
|
||||
func (m *MockAuthServiceClient) PasswordReset(arg0 context.Context, arg1 *grpc.ResetPassword, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "PasswordReset", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// PasswordReset indicates an expected call of PasswordReset
|
||||
func (mr *MockAuthServiceClientMockRecorder) PasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).PasswordReset), varargs...)
|
||||
}
|
||||
|
||||
// Ready mocks base method
|
||||
func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Ready", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -577,55 +337,15 @@ func (mr *MockAuthServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAuthServiceClient)(nil).Ready), varargs...)
|
||||
}
|
||||
|
||||
// RegisterUser mocks base method
|
||||
func (m *MockAuthServiceClient) RegisterUser(arg0 context.Context, arg1 *grpc.RegisterUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RegisterUser", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.User)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// RegisterUser indicates an expected call of RegisterUser
|
||||
func (mr *MockAuthServiceClientMockRecorder) RegisterUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUser", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUser), varargs...)
|
||||
}
|
||||
|
||||
// RegisterUserWithExternal mocks base method
|
||||
func (m *MockAuthServiceClient) RegisterUserWithExternal(arg0 context.Context, arg1 *grpc.RegisterUserExternalIDPRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RegisterUserWithExternal", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.User)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// RegisterUserWithExternal indicates an expected call of RegisterUserWithExternal
|
||||
func (mr *MockAuthServiceClientMockRecorder) RegisterUserWithExternal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUserWithExternal", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUserWithExternal), varargs...)
|
||||
}
|
||||
|
||||
// RemoveMfaOTP mocks base method
|
||||
func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RemoveMfaOTP", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -637,55 +357,15 @@ func (mr *MockAuthServiceClientMockRecorder) RemoveMfaOTP(arg0, arg1 interface{}
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).RemoveMfaOTP), varargs...)
|
||||
}
|
||||
|
||||
// RequestPasswordReset mocks base method
|
||||
func (m *MockAuthServiceClient) RequestPasswordReset(arg0 context.Context, arg1 *grpc.ResetPasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RequestPasswordReset", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// RequestPasswordReset indicates an expected call of RequestPasswordReset
|
||||
func (mr *MockAuthServiceClientMockRecorder) RequestPasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RequestPasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).RequestPasswordReset), varargs...)
|
||||
}
|
||||
|
||||
// ResendEmailVerificationMail mocks base method
|
||||
func (m *MockAuthServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail
|
||||
func (mr *MockAuthServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendEmailVerificationMail), varargs...)
|
||||
}
|
||||
|
||||
// ResendMyEmailVerificationMail mocks base method
|
||||
func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "ResendMyEmailVerificationMail", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -698,14 +378,14 @@ func (mr *MockAuthServiceClientMockRecorder) ResendMyEmailVerificationMail(arg0,
|
||||
}
|
||||
|
||||
// ResendMyPhoneVerificationCode mocks base method
|
||||
func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "ResendMyPhoneVerificationCode", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -717,66 +397,6 @@ func (mr *MockAuthServiceClientMockRecorder) ResendMyPhoneVerificationCode(arg0,
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyPhoneVerificationCode", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyPhoneVerificationCode), varargs...)
|
||||
}
|
||||
|
||||
// RevokeUserAgent mocks base method
|
||||
func (m *MockAuthServiceClient) RevokeUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RevokeUserAgent", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UserAgent)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// RevokeUserAgent indicates an expected call of RevokeUserAgent
|
||||
func (mr *MockAuthServiceClientMockRecorder) RevokeUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RevokeUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).RevokeUserAgent), varargs...)
|
||||
}
|
||||
|
||||
// SearchApplications mocks base method
|
||||
func (m *MockAuthServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SearchApplications", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.ApplicationSearchResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SearchApplications indicates an expected call of SearchApplications
|
||||
func (mr *MockAuthServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchApplications), varargs...)
|
||||
}
|
||||
|
||||
// SearchGrant mocks base method
|
||||
func (m *MockAuthServiceClient) SearchGrant(arg0 context.Context, arg1 *grpc.GrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.GrantSearchResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SearchGrant", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.GrantSearchResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SearchGrant indicates an expected call of SearchGrant
|
||||
func (mr *MockAuthServiceClientMockRecorder) SearchGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchGrant", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchGrant), varargs...)
|
||||
}
|
||||
|
||||
// SearchMyProjectOrgs mocks base method
|
||||
func (m *MockAuthServiceClient) SearchMyProjectOrgs(arg0 context.Context, arg1 *grpc.MyProjectOrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.MyProjectOrgSearchResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
@ -797,35 +417,15 @@ func (mr *MockAuthServiceClientMockRecorder) SearchMyProjectOrgs(arg0, arg1 inte
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMyProjectOrgs", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchMyProjectOrgs), varargs...)
|
||||
}
|
||||
|
||||
// SelectUser mocks base method
|
||||
func (m *MockAuthServiceClient) SelectUser(arg0 context.Context, arg1 *grpc.SelectUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SelectUser", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SelectUser indicates an expected call of SelectUser
|
||||
func (mr *MockAuthServiceClientMockRecorder) SelectUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectUser", reflect.TypeOf((*MockAuthServiceClient)(nil).SelectUser), varargs...)
|
||||
}
|
||||
|
||||
// SetMyPassword mocks base method
|
||||
func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SetMyPassword", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -837,46 +437,6 @@ func (mr *MockAuthServiceClientMockRecorder) SetMyPassword(arg0, arg1 interface{
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).SetMyPassword), varargs...)
|
||||
}
|
||||
|
||||
// SkipMfaInit mocks base method
|
||||
func (m *MockAuthServiceClient) SkipMfaInit(arg0 context.Context, arg1 *grpc.SkipMfaInitRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SkipMfaInit", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SkipMfaInit indicates an expected call of SkipMfaInit
|
||||
func (mr *MockAuthServiceClientMockRecorder) SkipMfaInit(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SkipMfaInit", reflect.TypeOf((*MockAuthServiceClient)(nil).SkipMfaInit), varargs...)
|
||||
}
|
||||
|
||||
// TerminateUserSession mocks base method
|
||||
func (m *MockAuthServiceClient) TerminateUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "TerminateUserSession", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// TerminateUserSession indicates an expected call of TerminateUserSession
|
||||
func (mr *MockAuthServiceClientMockRecorder) TerminateUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TerminateUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).TerminateUserSession), varargs...)
|
||||
}
|
||||
|
||||
// UpdateMyUserAddress mocks base method
|
||||
func (m *MockAuthServiceClient) UpdateMyUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) {
|
||||
m.ctrl.T.Helper()
|
||||
@ -918,14 +478,14 @@ func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserProfile(arg0, arg1 inte
|
||||
}
|
||||
|
||||
// Validate mocks base method
|
||||
func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) {
|
||||
func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*structpb.Struct, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Validate", varargs...)
|
||||
ret0, _ := ret[0].(*struct0.Struct)
|
||||
ret0, _ := ret[0].(*structpb.Struct)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -937,26 +497,6 @@ func (mr *MockAuthServiceClientMockRecorder) Validate(arg0, arg1 interface{}, ar
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAuthServiceClient)(nil).Validate), varargs...)
|
||||
}
|
||||
|
||||
// VerifyMfa mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyMfa(arg0 context.Context, arg1 *grpc.VerifyMfaRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyMfa", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// VerifyMfa indicates an expected call of VerifyMfa
|
||||
func (mr *MockAuthServiceClientMockRecorder) VerifyMfa(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfa", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfa), varargs...)
|
||||
}
|
||||
|
||||
// VerifyMfaOTP mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyMfaOTP(arg0 context.Context, arg1 *grpc.VerifyMfaOtp, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
@ -978,14 +518,14 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMfaOTP(arg0, arg1 interface{}
|
||||
}
|
||||
|
||||
// VerifyMyUserEmail mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyMyUserEmail", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -998,14 +538,14 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserEmail(arg0, arg1 interf
|
||||
}
|
||||
|
||||
// VerifyMyUserPhone mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyMyUserPhone", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
@ -1016,63 +556,3 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserPhone(arg0, arg1 interf
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserPhone), varargs...)
|
||||
}
|
||||
|
||||
// VerifyPassword mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyPassword(arg0 context.Context, arg1 *grpc.VerifyPasswordRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyPassword", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// VerifyPassword indicates an expected call of VerifyPassword
|
||||
func (mr *MockAuthServiceClientMockRecorder) VerifyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyPassword), varargs...)
|
||||
}
|
||||
|
||||
// VerifyUser mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyUser(arg0 context.Context, arg1 *grpc.VerifyUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyUser", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.AuthSessionResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// VerifyUser indicates an expected call of VerifyUser
|
||||
func (mr *MockAuthServiceClientMockRecorder) VerifyUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUser", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUser), varargs...)
|
||||
}
|
||||
|
||||
// VerifyUserEmail mocks base method
|
||||
func (m *MockAuthServiceClient) VerifyUserEmail(arg0 context.Context, arg1 *grpc.VerifyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "VerifyUserEmail", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// VerifyUserEmail indicates an expected call of VerifyUserEmail
|
||||
func (mr *MockAuthServiceClientMockRecorder) VerifyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUserEmail), varargs...)
|
||||
}
|
||||
|
@ -1,10 +0,0 @@
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/zitadel/internal/errors"
|
||||
)
|
||||
|
||||
func (s *Server) CreateToken(ctx context.Context, request *CreateTokenRequest) (_ *Token, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-86dG3", "Not implemented")
|
||||
}
|
@ -10,10 +10,6 @@ func (s *Server) GetUserByID(ctx context.Context, request *UserID) (*User, error
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-fj74G", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) IsUserUnique(ctx context.Context, request *UniqueUserRequest) (*UniqueUserResponse, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dke9f", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*UserProfile, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-fis93", "Not implemented")
|
||||
}
|
||||
@ -34,14 +30,6 @@ func (s *Server) GetMyMfas(ctx context.Context, _ *empty.Empty) (*MultiFactors,
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-vkl9i", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) RegisterUser(ctx context.Context, request *RegisterUserRequest) (*User, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-03idx", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) RegisterUserWithExternal(ctx context.Context, request *RegisterUserExternalIDPRequest) (*User, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dlwpd", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) UpdateMyUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented")
|
||||
}
|
||||
@ -85,13 +73,6 @@ func (s *Server) UpdateMyUserAddress(ctx context.Context, request *UpdateUserAdd
|
||||
func (s *Server) SetMyPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-pl9c2", "Not implemented")
|
||||
}
|
||||
func (s *Server) RequestPasswordReset(ctx context.Context, request *ResetPasswordRequest) (*empty.Empty, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-xm5hW", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) PasswordReset(ctx context.Context, request *ResetPassword) (*empty.Empty, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-mce5W", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) ChangeMyPassword(ctx context.Context, request *PasswordChange) (*empty.Empty, error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dlo6G", "Not implemented")
|
||||
@ -109,14 +90,6 @@ func (s *Server) RemoveMfaOTP(ctx context.Context, _ *empty.Empty) (_ *empty.Emp
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-9k46d", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) SkipMfaInit(ctx context.Context, request *SkipMfaInitRequest) (_ *empty.Empty, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dl3i5", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) VerifyUserInit(ctx context.Context, request *VerifyUserInitRequest) (_ *empty.Empty, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-itk6h", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) ResendUserInitMail(ctx context.Context, request *UserID) (_ *empty.Empty, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-dk467", "Not implemented")
|
||||
}
|
||||
|
@ -1,18 +0,0 @@
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/zitadel/internal/errors"
|
||||
)
|
||||
|
||||
func (s *Server) GetUserAgent(ctx context.Context, request *UserAgentID) (_ *UserAgent, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-iu7jF", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) CreateUserAgent(ctx context.Context, request *UserAgentCreation) (_ *UserAgent, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-sdfk3", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) RevokeUserAgent(ctx context.Context, id *UserAgentID) (_ *UserAgent, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-09HjK", "Not implemented")
|
||||
}
|
@ -6,18 +6,6 @@ import (
|
||||
"github.com/golang/protobuf/ptypes/empty"
|
||||
)
|
||||
|
||||
func (s *Server) GetUserAgentSessions(ctx context.Context, id *UserAgentID) (_ *UserSessions, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-ue45f", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) GetUserSession(ctx context.Context, id *UserSessionID) (_ *UserSession, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-lor5h", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) TerminateUserSession(ctx context.Context, id *UserSessionID) (_ *empty.Empty, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-bnmt6", "Not implemented")
|
||||
}
|
||||
|
||||
func (s *Server) GetMyUserSessions(ctx context.Context, _ *empty.Empty) (_ *UserSessionViews, err error) {
|
||||
return nil, errors.ThrowUnimplemented(nil, "GRPC-nc52s", "Not implemented")
|
||||
}
|
||||
|
@ -51,85 +51,6 @@ service AuthService {
|
||||
}
|
||||
|
||||
// Authorization
|
||||
rpc GetUserAgent(UserAgentID) returns (UserAgent) {
|
||||
option (google.api.http) = {
|
||||
get: "/useragents/{id}"
|
||||
};
|
||||
}
|
||||
|
||||
rpc CreateUserAgent(UserAgentCreation) returns (UserAgent) {
|
||||
option (google.api.http) = {
|
||||
post: "/useragents"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc RevokeUserAgent(UserAgentID) returns (UserAgent) {
|
||||
option (google.api.http) = {
|
||||
put: "/useragents/{id}"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc CreateAuthSession(AuthSessionCreation) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
post: "/useragents/{agent_id}/authsessions"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetAuthSession(AuthSessionID) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
get: "/useragents/{agent_id}/authsessions/{id}"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetAuthSessionByTokenID(TokenID) returns (AuthSessionView) {
|
||||
option (google.api.http) = {
|
||||
get: "/tokens/{id}/authsession"
|
||||
};
|
||||
}
|
||||
|
||||
rpc SelectUser(SelectUserRequest) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc VerifyUser(VerifyUserRequest) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc VerifyPassword(VerifyPasswordRequest) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc VerifyMfa(VerifyMfaRequest) returns (AuthSessionResponse) {
|
||||
option (google.api.http) = {
|
||||
put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetUserAgentSessions(UserAgentID) returns (UserSessions) {
|
||||
option (google.api.http) = {
|
||||
get: "/useragents/{id}/usersessions"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetUserSession(UserSessionID) returns (UserSession) {
|
||||
option (google.api.http) = {
|
||||
get: "/useragents/{agent_id}/usersessions/{id}"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetMyUserSessions(google.protobuf.Empty) returns (UserSessionViews) {
|
||||
option (google.api.http) = {
|
||||
get: "/me/usersessions"
|
||||
@ -140,40 +61,7 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
rpc TerminateUserSession(UserSessionID) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
delete: "/useragents/{agent_id}/usersessions/{id}"
|
||||
};
|
||||
}
|
||||
|
||||
rpc CreateToken(CreateTokenRequest) returns (Token) {
|
||||
option (google.api.http) = {
|
||||
post: "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
//User
|
||||
rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) {
|
||||
option (google.api.http) = {
|
||||
get: "/users/_isunique"
|
||||
};
|
||||
}
|
||||
|
||||
rpc RegisterUser(RegisterUserRequest) returns (User) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/_register"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc RegisterUserWithExternal(RegisterUserExternalIDPRequest) returns (User) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/_externalregister"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc GetMyUserProfile(google.protobuf.Empty) returns (UserProfile) {
|
||||
option (google.api.http) = {
|
||||
get: "/users/me/profile"
|
||||
@ -227,14 +115,6 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
rpc VerifyUserEmail(VerifyUserEmailRequest) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/{id}/email/_verify"
|
||||
body: "*"
|
||||
};
|
||||
|
||||
}
|
||||
|
||||
rpc ResendMyEmailVerificationMail(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/me/email/_resendverification"
|
||||
@ -246,14 +126,6 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/{id}/email/_resendverification"
|
||||
body: "*"
|
||||
};
|
||||
|
||||
}
|
||||
|
||||
rpc GetMyUserPhone(google.protobuf.Empty) returns (UserPhone) {
|
||||
option (google.api.http) = {
|
||||
get: "/users/me/phone"
|
||||
@ -340,20 +212,6 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
rpc RequestPasswordReset(ResetPasswordRequest) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/passwords/_requestpwreset"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc PasswordReset(ResetPassword) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/{id}/passwords/_resetpw"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc ChangeMyPassword(PasswordChange) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
put: "/users/me/passwords/_change"
|
||||
@ -397,14 +255,6 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
rpc SkipMfaInit(SkipMfaInitRequest) returns (google.protobuf.Empty) {
|
||||
option (google.api.http) = {
|
||||
post: "/users/{user_id}/mfa/_skipinit"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
|
||||
//TODO: Remove func only for tests
|
||||
rpc GetUserByID(UserID) returns (User) {
|
||||
option (google.api.http) = {
|
||||
@ -412,35 +262,6 @@ service AuthService {
|
||||
};
|
||||
}
|
||||
|
||||
//Application
|
||||
rpc GetApplicationByID(ApplicationID) returns (Application) {
|
||||
option (google.api.http) = {
|
||||
get: "/applications/{id}"
|
||||
};
|
||||
}
|
||||
|
||||
rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) {
|
||||
option (google.api.http) = {
|
||||
post: "/applications/_search"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc AuthorizeApplication(ApplicationAuthorizeRequest) returns (Application) {
|
||||
option (google.api.http) = {
|
||||
post: "/applications/_authorize"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
//Grant
|
||||
rpc SearchGrant(GrantSearchRequest) returns (GrantSearchResponse) {
|
||||
option (google.api.http) = {
|
||||
post: "/grants/_search"
|
||||
body: "*"
|
||||
};
|
||||
}
|
||||
|
||||
rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) {
|
||||
option (google.api.http) = {
|
||||
post: "/global/projectorgs/_search"
|
||||
@ -474,111 +295,6 @@ service AuthService {
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
message SessionRequest {
|
||||
string user_id = 1;
|
||||
BrowserInformation browser_info = 2;
|
||||
}
|
||||
|
||||
message UserAgent {
|
||||
string id = 1;
|
||||
BrowserInformation browser_info = 2;
|
||||
UserAgentState state = 3;
|
||||
}
|
||||
|
||||
|
||||
enum UserAgentState {
|
||||
USERAGENTSTATE_UNSPECIFIED = 0;
|
||||
USERAGENTSTATE_ACTIVE = 1;
|
||||
USERAGENTSTATE_TERMINATED = 2;
|
||||
}
|
||||
|
||||
message UserAgentID {
|
||||
string id = 1;
|
||||
}
|
||||
|
||||
message UserAgentCreation {
|
||||
BrowserInformation browser_info = 1 [(validate.rules).message.required = true];
|
||||
}
|
||||
|
||||
message UserAgents {
|
||||
repeated UserAgent sessions = 1;
|
||||
}
|
||||
|
||||
message AuthSessionCreation {
|
||||
string agent_id = 1 [(validate.rules).string.min_len = 1];
|
||||
AuthSessionType type = 2;
|
||||
BrowserInformation browser_info = 3 [(validate.rules).message.required = true];
|
||||
string client_id = 4 [(validate.rules).string.min_len = 1];
|
||||
string redirect_uri = 5 [(validate.rules).string.min_len = 1];
|
||||
string state = 6;
|
||||
Prompt prompt = 7;
|
||||
repeated string auth_context_class_reference = 8;
|
||||
repeated string ui_locales = 9;
|
||||
string login_hint = 10;
|
||||
uint32 max_age = 11;
|
||||
oneof type_info {
|
||||
AuthRequestOIDC oidc = 12;
|
||||
}
|
||||
string preselected_user_id = 13;
|
||||
}
|
||||
|
||||
message AuthSessionResponse {
|
||||
string agent_id = 1;
|
||||
string id = 2;
|
||||
AuthSessionType type = 3;
|
||||
string client_id = 4;
|
||||
string redirect_uri = 5;
|
||||
string state = 6;
|
||||
Prompt prompt = 7;
|
||||
repeated string auth_context_class_reference = 8;
|
||||
repeated string ui_locales = 9;
|
||||
string login_hint = 10;
|
||||
uint32 max_age = 11;
|
||||
oneof type_info {
|
||||
AuthRequestOIDC oidc = 12;
|
||||
}
|
||||
repeated NextStep possible_steps = 13;
|
||||
repeated string project_client_ids = 14;
|
||||
UserSession user_session = 15;
|
||||
}
|
||||
|
||||
message AuthSessionView {
|
||||
string agent_id = 1;
|
||||
string auth_session_id = 2;
|
||||
AuthSessionType type = 3;
|
||||
string client_id = 4;
|
||||
string user_session_id = 5;
|
||||
repeated string project_client_ids = 6;
|
||||
string token_id = 7;
|
||||
google.protobuf.Timestamp token_expiration = 8;
|
||||
string user_id = 9;
|
||||
}
|
||||
|
||||
message TokenID {
|
||||
string id = 1;
|
||||
}
|
||||
|
||||
message UserSessionID {
|
||||
string id = 1;
|
||||
string agent_id = 2;
|
||||
}
|
||||
|
||||
message UserSessions {
|
||||
repeated UserSession user_sessions = 1;
|
||||
}
|
||||
|
||||
message UserSession {
|
||||
string id = 1;
|
||||
string agent_id = 2;
|
||||
UserSessionState auth_state = 3;
|
||||
AuthUser user = 4;
|
||||
bool password_verified = 5;
|
||||
MfaType mfa = 6;
|
||||
bool mfa_verified = 7;
|
||||
google.protobuf.Timestamp auth_time = 8;
|
||||
}
|
||||
|
||||
message UserSessionViews {
|
||||
repeated UserSessionView user_sessions = 1;
|
||||
}
|
||||
@ -590,212 +306,22 @@ message UserSessionView {
|
||||
string user_name = 5;
|
||||
}
|
||||
|
||||
message AuthUser {
|
||||
string user_id = 1;
|
||||
string user_name = 2;
|
||||
}
|
||||
|
||||
enum UserSessionState {
|
||||
USERSESSIONSTATE_UNSPECIFIED = 0;
|
||||
USERSESSIONSTATE_ACTIVE = 1;
|
||||
USERSESSIONSTATE_TERMINATED = 2;
|
||||
}
|
||||
|
||||
message AuthSessionID {
|
||||
string id = 1;
|
||||
string agent_id = 2;
|
||||
BrowserInformation browser_info = 3;
|
||||
}
|
||||
|
||||
message SelectUserRequest {
|
||||
string agent_id = 1;
|
||||
string auth_session_id = 2;
|
||||
string user_session_id = 3;
|
||||
BrowserInformation browser_info = 4 [(validate.rules).message.required = true];
|
||||
}
|
||||
|
||||
message VerifyUserRequest {
|
||||
string agent_id = 1 [(validate.rules).string.min_len = 1];
|
||||
string auth_session_id = 2 [(validate.rules).string.min_len = 1];
|
||||
string user_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
BrowserInformation browser_info = 4 [(validate.rules).message.required = true];
|
||||
}
|
||||
|
||||
message VerifyPasswordRequest {
|
||||
string agent_id = 1 [(validate.rules).string.min_len = 1];
|
||||
string auth_session_id = 2 [(validate.rules).string.min_len = 1];
|
||||
string password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
BrowserInformation browser_info = 4 [(validate.rules).message.required = true];
|
||||
}
|
||||
|
||||
message VerifyMfaRequest {
|
||||
string agent_id = 1 [(validate.rules).string.min_len = 1];
|
||||
string auth_session_id = 2 [(validate.rules).string.min_len = 1];
|
||||
BrowserInformation browser_info = 3;
|
||||
oneof mfa {
|
||||
AuthSessionMultiFactorOTP otp = 4;
|
||||
}
|
||||
}
|
||||
|
||||
message AuthSessionMultiFactorOTP {
|
||||
string code = 1 [(validate.rules).string = {max_len: 200}];
|
||||
}
|
||||
|
||||
message NextStep {
|
||||
NextStepType type = 1;
|
||||
oneof data {
|
||||
LoginData login = 2;
|
||||
PasswordData password = 3;
|
||||
MfaVerifyData mfa_verify = 4;
|
||||
MfaPromptData mfa_prompt = 5;
|
||||
ChooseUserData choose_user = 6;
|
||||
}
|
||||
}
|
||||
|
||||
enum NextStepType {
|
||||
NEXTSTEP_UNSPECIFIED = 0;
|
||||
NEXTSTEP_LOGIN = 1;
|
||||
NEXTSTEP_PASSWORD = 2;
|
||||
NEXTSTEP_CHANGE_PASSWORD = 3;
|
||||
NEXTSTEP_MFA_PROMPT = 4; //TODO: ?
|
||||
NEXTSTEP_MFA_INIT_CHOICE = 5; //TODO: ?
|
||||
NEXTSTEP_MFA_INIT_CREATE = 6;
|
||||
NEXTSTEP_MFA_INIT_VERIFY = 7;
|
||||
NEXTSTEP_MFA_INIT_DONE = 8;
|
||||
NEXTSTEP_MFA_VERIFY = 9;
|
||||
NEXTSTEP_MFA_VERIFY_ASYNC = 10;
|
||||
NEXTSTEP_VERIFY_EMAIL = 11;
|
||||
NEXTSTEP_REDIRECT_TO_CALLBACK = 12;
|
||||
NEXTSTEP_INIT_PASSWORD = 13;
|
||||
NEXTSTEP_CHOOSE_USER = 14;
|
||||
}
|
||||
|
||||
message LoginData {
|
||||
string err_msg = 1;
|
||||
}
|
||||
|
||||
message PasswordData {
|
||||
string err_msg = 1;
|
||||
uint32 failure_count = 2;
|
||||
}
|
||||
|
||||
message MfaVerifyData {
|
||||
string err_msg = 1;
|
||||
uint32 failure_count = 2;
|
||||
repeated MfaType mfa_providers = 3;
|
||||
}
|
||||
|
||||
message MfaPromptData {
|
||||
bool required = 1;
|
||||
repeated MfaType mfa_providers = 2;
|
||||
}
|
||||
|
||||
message ChooseUserData {
|
||||
repeated ChooseUser users = 1;
|
||||
}
|
||||
|
||||
message ChooseUser {
|
||||
string user_session_id = 1;
|
||||
string user_id = 2;
|
||||
string user_name = 3;
|
||||
UserSessionState user_session_state = 4;
|
||||
}
|
||||
|
||||
message SkipMfaInitRequest {
|
||||
string user_id = 1;
|
||||
}
|
||||
|
||||
enum AuthSessionType {
|
||||
AUTHSESSIONTYPE_UNSPECIFIED = 0; //TODO: necessary?
|
||||
AUTHSESSIONTYPE_OIDC = 1;
|
||||
AUTHSESSIONTYPE_SAML = 2;
|
||||
}
|
||||
|
||||
message BrowserInformation {
|
||||
string user_agent = 1;
|
||||
IP remote_ip = 2 [(validate.rules).message.required = true];
|
||||
string accept_language = 3;
|
||||
}
|
||||
|
||||
message IP {
|
||||
string V4 = 1;
|
||||
string V6 = 2;
|
||||
}
|
||||
|
||||
enum Prompt {
|
||||
PROMPT_UNSPECIFIED = 0;
|
||||
PROMPT_NONE = 1;
|
||||
PROMPT_LOGIN = 2;
|
||||
PROMPT_CONSENT = 3;
|
||||
PROMPT_SELECT_ACCOUNT = 4;
|
||||
}
|
||||
|
||||
message AuthRequestOIDC {
|
||||
repeated string scope = 1;
|
||||
OIDCResponseType response_type = 2;
|
||||
string nonce = 3;
|
||||
CodeChallenge code_challenge = 4;
|
||||
}
|
||||
|
||||
enum OIDCResponseType {
|
||||
OIDCRESPONSETYPE_CODE = 0;
|
||||
OIDCRESPONSETYPE_ID_TOKEN = 1;
|
||||
OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2;
|
||||
}
|
||||
|
||||
message CodeChallenge {
|
||||
string challenge = 1;
|
||||
CodeChallengeMethod method = 2;
|
||||
}
|
||||
|
||||
enum CodeChallengeMethod {
|
||||
CODECHALLENGEMETHOD_PLAIN = 0;
|
||||
CODECHALLENGEMETHOD_S256 = 1;
|
||||
}
|
||||
|
||||
message UserID {
|
||||
string id = 1;
|
||||
}
|
||||
|
||||
message UniqueUserRequest {
|
||||
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
}
|
||||
|
||||
message UniqueUserResponse {
|
||||
bool is_unique = 1;
|
||||
}
|
||||
|
||||
|
||||
message RegisterUserRequest {
|
||||
string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}];
|
||||
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
|
||||
string display_name = 5 [(validate.rules).string = {max_len: 200}];
|
||||
string preferred_language = 6 [(validate.rules).string = {max_len: 200}];
|
||||
Gender gender = 7;
|
||||
string password = 8 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
string org_id = 9 [(validate.rules).string.min_len = 1];
|
||||
}
|
||||
|
||||
message RegisterUserExternalIDPRequest {
|
||||
string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}];
|
||||
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
|
||||
string display_name = 5 [(validate.rules).string = {max_len: 200}];
|
||||
string preferred_language = 6 [(validate.rules).string = {max_len: 200}];
|
||||
Gender gender = 7;
|
||||
IDPProvider idp_provider = 8;
|
||||
string org_id = 9 [(validate.rules).string.min_len = 1];
|
||||
}
|
||||
|
||||
message IDPProvider {
|
||||
string provider = 8;
|
||||
string externalIdpID = 9;
|
||||
}
|
||||
|
||||
message User {
|
||||
string id = 1;
|
||||
UserState state = 2;
|
||||
@ -910,7 +436,7 @@ message UpdateUserAddressRequest {
|
||||
string street_address = 5 [(validate.rules).string = {max_len: 200}];
|
||||
}
|
||||
|
||||
message PasswordID{
|
||||
message PasswordID {
|
||||
string id = 1;
|
||||
}
|
||||
|
||||
@ -918,27 +444,6 @@ message PasswordRequest {
|
||||
string password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
}
|
||||
|
||||
message ResetPasswordRequest {
|
||||
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
NotificationType type = 2;
|
||||
}
|
||||
|
||||
message ResetPassword {
|
||||
string id = 1 [(validate.rules).string.min_len = 1];
|
||||
string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
||||
string new_password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
}
|
||||
|
||||
message SetPasswordNotificationRequest {
|
||||
string id = 1;
|
||||
NotificationType type = 2;
|
||||
}
|
||||
|
||||
enum NotificationType {
|
||||
NOTIFICATIONTYPE_EMAIL = 0;
|
||||
NOTIFICATIONTYPE_SMS = 1;
|
||||
}
|
||||
|
||||
message PasswordChange {
|
||||
string old_password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
string new_password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
||||
@ -977,143 +482,11 @@ enum MFAState {
|
||||
MFASTATE_REMOVED = 3;
|
||||
}
|
||||
|
||||
message ApplicationID {
|
||||
string id = 1;
|
||||
}
|
||||
|
||||
message Application {
|
||||
string id = 1;
|
||||
AppState state = 2;
|
||||
google.protobuf.Timestamp creation_date = 3;
|
||||
google.protobuf.Timestamp change_date = 4;
|
||||
string name = 5;
|
||||
oneof app_config {
|
||||
OIDCConfig oidc_config = 8;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
enum AppState {
|
||||
APPSTATE_UNSPECIFIED = 0;
|
||||
APPSTATE_ACTIVE = 1;
|
||||
APPSTATE_INACTIVE = 2;
|
||||
APPSTATE_DELETED = 3;
|
||||
}
|
||||
|
||||
|
||||
message OIDCConfig {
|
||||
repeated string redirect_uris = 1;
|
||||
repeated OIDCResponseType response_types = 2;
|
||||
repeated OIDCGrantType grant_types = 3;
|
||||
OIDCApplicationType application_type = 4;
|
||||
string client_secret = 5;
|
||||
string client_id = 6;
|
||||
OIDCAuthMethodType auth_method_type = 7;
|
||||
repeated string post_logout_redirect_uris = 8;
|
||||
}
|
||||
|
||||
enum OIDCGrantType {
|
||||
OIDCGRANTTYPE_AUTHORIZATION_CODE = 0;
|
||||
OIDCGRANTTYPE_GRANT_TYPE_NONE = 1;
|
||||
OIDCGRANTTYPE_REFRESH_TOKEN = 2;
|
||||
}
|
||||
|
||||
enum OIDCApplicationType {
|
||||
OIDCAPPLICATIONTYPE_WEB = 0;
|
||||
OIDCAPPLICATIONTYPE_USER_AGENT = 1;
|
||||
OIDCAPPLICATIONTYPE_NATIVE = 2;
|
||||
}
|
||||
|
||||
enum OIDCAuthMethodType {
|
||||
OIDCAUTHMETHODTYPE_BASIC = 0;
|
||||
OIDCAUTHMETHODTYPE_POST = 1;
|
||||
OIDCAUTHMETHODTYPE_NONE = 2;
|
||||
}
|
||||
|
||||
message ApplicationSearchRequest {
|
||||
uint64 offset = 1;
|
||||
uint64 limit = 2;
|
||||
ApplicationSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];;
|
||||
bool asc = 4;
|
||||
repeated ApplicationSearchQuery queries = 5;
|
||||
}
|
||||
|
||||
message ApplicationSearchQuery {
|
||||
ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];;
|
||||
SearchMethod method = 2;
|
||||
string value = 3;
|
||||
}
|
||||
|
||||
enum ApplicationSearchKey {
|
||||
APPLICATIONSEARCHKEY_UNSPECIFIED = 0;
|
||||
APPLICATIONSEARCHKEY_APP_TYPE = 1;
|
||||
APPLICATIONSEARCHKEY_STATE = 2;
|
||||
APPLICATIONSEARCHKEY_CLIENT_ID = 3;
|
||||
APPLICATIONSEARCHKEY_APP_NAME = 4;
|
||||
APPLICATIONSEARCHKEY_PROJECT_ID = 5;
|
||||
}
|
||||
|
||||
message ApplicationSearchResponse {
|
||||
uint64 offset = 1;
|
||||
uint64 limit = 2;
|
||||
uint64 total_result = 3;
|
||||
repeated Application result = 4;
|
||||
}
|
||||
|
||||
enum SearchMethod {
|
||||
SEARCHMETHOD_EQUALS = 0;
|
||||
SEARCHMETHOD_STARTS_WITH = 1;
|
||||
SEARCHMETHOD_CONTAINS = 2;
|
||||
}
|
||||
|
||||
message ApplicationAuthorizeRequest {
|
||||
oneof auth {
|
||||
OIDCClientAuth oidc_client_auth = 1;
|
||||
}
|
||||
}
|
||||
|
||||
message OIDCClientAuth {
|
||||
string client_id = 1;
|
||||
string client_secret = 2;
|
||||
}
|
||||
|
||||
|
||||
message GrantSearchRequest {
|
||||
uint64 offset = 1;
|
||||
uint64 limit = 2;
|
||||
GrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];;
|
||||
bool asc = 4;
|
||||
repeated GrantSearchQuery queries = 5;
|
||||
}
|
||||
|
||||
message GrantSearchQuery {
|
||||
GrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];;
|
||||
SearchMethod method = 2;
|
||||
string value = 3;
|
||||
}
|
||||
|
||||
enum GrantSearchKey {
|
||||
GRANTSEARCHKEY_UNSPECIFIED = 0;
|
||||
GRANTSEARCHKEY_ORG_ID = 1;
|
||||
GRANTSEARCHKEY_PROJECT_ID = 2;
|
||||
GRANTSEARCHKEY_USER_ID = 3;
|
||||
}
|
||||
|
||||
message GrantSearchResponse {
|
||||
uint64 offset = 1;
|
||||
uint64 limit = 2;
|
||||
uint64 total_result = 3;
|
||||
repeated Grant result = 4;
|
||||
}
|
||||
|
||||
message Grant {
|
||||
string OrgId = 1;
|
||||
string ProjectId = 2;
|
||||
string UserId = 3;
|
||||
repeated string Roles = 4;
|
||||
string OrgName = 5;
|
||||
}
|
||||
|
||||
message MyProjectOrgSearchRequest {
|
||||
uint64 offset = 1;
|
||||
uint64 limit = 2;
|
||||
@ -1148,23 +521,12 @@ message Org {
|
||||
string name = 2;
|
||||
}
|
||||
|
||||
message CreateTokenRequest {
|
||||
string agent_id = 1 [(validate.rules).string.min_len = 1];
|
||||
string auth_session_id = 2 [(validate.rules).string.min_len = 1];
|
||||
}
|
||||
|
||||
message Token {
|
||||
string id = 1;
|
||||
google.protobuf.Timestamp expiration = 8;
|
||||
}
|
||||
|
||||
message MyPermissions {
|
||||
repeated string permissions = 1;
|
||||
}
|
||||
|
||||
|
||||
message VerifyUserInitRequest {
|
||||
string id = 1;
|
||||
string code = 2;
|
||||
string password = 3;
|
||||
}
|
||||
enum SearchMethod {
|
||||
SEARCHMETHOD_EQUALS = 0;
|
||||
SEARCHMETHOD_STARTS_WITH = 1;
|
||||
SEARCHMETHOD_CONTAINS = 2;
|
||||
}
|
@ -2,8 +2,6 @@ package auth
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/logging"
|
||||
|
||||
"github.com/caos/zitadel/internal/api/auth"
|
||||
app "github.com/caos/zitadel/internal/auth"
|
||||
"github.com/caos/zitadel/pkg/auth/api"
|
||||
@ -14,8 +12,6 @@ type Config struct {
|
||||
API api.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) error {
|
||||
err := api.Start(ctx, config.API)
|
||||
logging.Log("MAIN-udjed").OnError(err).Panic("unable to start api")
|
||||
return err
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) {
|
||||
api.Start(ctx, config.API)
|
||||
}
|
||||
|
@ -17,13 +17,10 @@ type Config struct {
|
||||
GRPC grpc_util.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, conf Config) error {
|
||||
api := &API{
|
||||
grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()),
|
||||
gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()),
|
||||
}
|
||||
server.StartServer(ctx, &api.grpcServer)
|
||||
server.StartGateway(ctx, &api.gateway)
|
||||
func Start(ctx context.Context, conf Config) {
|
||||
grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig())
|
||||
grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig())
|
||||
|
||||
return nil
|
||||
server.StartServer(ctx, grpcServer)
|
||||
server.StartGateway(ctx, grpcGateway)
|
||||
}
|
||||
|
@ -2,8 +2,6 @@ package management
|
||||
|
||||
import (
|
||||
"context"
|
||||
"github.com/caos/logging"
|
||||
|
||||
"github.com/caos/zitadel/internal/api/auth"
|
||||
app "github.com/caos/zitadel/internal/management"
|
||||
"github.com/caos/zitadel/pkg/management/api"
|
||||
@ -14,8 +12,6 @@ type Config struct {
|
||||
API api.Config
|
||||
}
|
||||
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) error {
|
||||
err := api.Start(ctx, config.API)
|
||||
logging.Log("MAIN-6dhRs").OnError(err).Panic("unable to start api")
|
||||
return err
|
||||
func Start(ctx context.Context, config Config, authZ auth.Config) {
|
||||
api.Start(ctx, config.API)
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user