fix: generated files

This commit is contained in:
Fabiennne 2020-03-23 12:25:16 +01:00
parent a6baaafb0e
commit c5a5b65a03
15 changed files with 670 additions and 256 deletions

3
go.mod
View File

@ -8,6 +8,7 @@ require (
github.com/Masterminds/semver v1.5.0 // indirect
github.com/Masterminds/sprig v2.22.0+incompatible
github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a
github.com/envoyproxy/protoc-gen-validate v0.1.0
github.com/ghodss/yaml v1.0.0
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b
github.com/golang/mock v1.4.3
@ -29,7 +30,7 @@ require (
golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae // indirect
golang.org/x/text v0.3.2 // indirect
golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135
google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c // indirect
google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c
google.golang.org/grpc v1.28.0
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect
gopkg.in/yaml.v2 v2.2.8 // indirect

1
go.sum
View File

@ -19,6 +19,7 @@ github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSs
github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrpgBZ1R8UNe3ddc+A=
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk=
github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=

View File

@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584960713, 0)}
info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584961378, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}

View File

@ -5,15 +5,36 @@ package grpc
import (
"google.golang.org/grpc"
utils_auth "github.com/caos/citadel/utils/auth"
utils_grpc "github.com/caos/citadel/utils/grpc"
utils_auth "github.com/caos/zitadel/internal/auth"
utils_grpc "github.com/caos/zitadel/internal/grpc"
)
/**
* AdminService
*/
var AdminService_AuthMethods = utils_auth.AuthMethodMapping{}
var AdminService_AuthMethods = utils_auth.AuthMethodMapping{
"/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.AuthOption{
Permission: "iam.read",
CheckParam: "",
},
"/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.AuthOption{
Permission: "iam.read",
CheckParam: "",
},
"/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.AuthOption{
Permission: "iam.read",
CheckParam: "",
},
"/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.AuthOption{
Permission: "iam.write",
CheckParam: "",
},
}
func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor {
return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods)

View File

@ -4,7 +4,7 @@
"title": "admin service",
"version": "0.1",
"contact": {
"url": "https://github.com/caos/citadel/admin"
"url": "https://github.com/caos/zitadel/admin"
}
},
"schemes": [
@ -36,6 +36,113 @@
]
}
},
"/orgs/_isunique": {
"get": {
"summary": "ORG",
"operationId": "IsOrgUnique",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"$ref": "#/definitions/v1UniqueOrgResponse"
}
}
},
"parameters": [
{
"name": "name",
"in": "query",
"required": false,
"type": "string"
},
{
"name": "domain",
"in": "query",
"required": false,
"type": "string"
}
],
"tags": [
"AdminService"
]
}
},
"/orgs/_search": {
"post": {
"operationId": "SearchOrgs",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"$ref": "#/definitions/v1OrgSearchResponse"
}
}
},
"parameters": [
{
"name": "body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/v1OrgSearchRequest"
}
}
],
"tags": [
"AdminService"
]
}
},
"/orgs/_setup": {
"post": {
"operationId": "SetUpOrg",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"$ref": "#/definitions/v1OrgSetUpResponse"
}
}
},
"parameters": [
{
"name": "body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/v1OrgSetUpRequest"
}
}
],
"tags": [
"AdminService"
]
}
},
"/orgs/{id}": {
"get": {
"operationId": "GetOrgByID",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"$ref": "#/definitions/v1Org"
}
}
},
"parameters": [
{
"name": "id",
"in": "path",
"required": true,
"type": "string"
}
],
"tags": [
"AdminService"
]
}
},
"/ready": {
"get": {
"summary": "Ready returns status OK as soon as all dependent services are available",
@ -136,6 +243,288 @@
}
},
"description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value."
},
"v1CreateOrgRequest": {
"type": "object",
"properties": {
"name": {
"type": "string"
},
"domain": {
"type": "string"
}
}
},
"v1Gender": {
"type": "string",
"enum": [
"GENDER_UNSPECIFIED",
"GENDER_FEMALE",
"GENDER_MALE",
"GENDER_DIVERSE"
],
"default": "GENDER_UNSPECIFIED"
},
"v1Org": {
"type": "object",
"properties": {
"id": {
"type": "string"
},
"state": {
"$ref": "#/definitions/v1OrgState"
},
"creation_date": {
"type": "string",
"format": "date-time"
},
"change_date": {
"type": "string",
"format": "date-time"
},
"name": {
"type": "string"
},
"domain": {
"type": "string"
}
}
},
"v1OrgSearchKey": {
"type": "string",
"enum": [
"ORGSEARCHKEY_UNSPECIFIED",
"ORGSEARCHKEY_ORG_NAME",
"ORGSEARCHKEY_DOMAIN",
"ORGSEARCHKEY_STATE"
],
"default": "ORGSEARCHKEY_UNSPECIFIED"
},
"v1OrgSearchMethod": {
"type": "string",
"enum": [
"ORGSEARCHMETHOD_EQUALS",
"ORGSEARCHMETHOD_STARTS_WITH",
"ORGSEARCHMETHOD_CONTAINS"
],
"default": "ORGSEARCHMETHOD_EQUALS"
},
"v1OrgSearchQuery": {
"type": "object",
"properties": {
"key": {
"$ref": "#/definitions/v1OrgSearchKey"
},
"method": {
"$ref": "#/definitions/v1OrgSearchMethod"
},
"value": {
"type": "string"
}
}
},
"v1OrgSearchRequest": {
"type": "object",
"properties": {
"offset": {
"type": "string",
"format": "uint64"
},
"limit": {
"type": "string",
"format": "uint64"
},
"sorting_column": {
"$ref": "#/definitions/v1OrgSearchKey"
},
"asc": {
"type": "boolean",
"format": "boolean"
},
"queries": {
"type": "array",
"items": {
"$ref": "#/definitions/v1OrgSearchQuery"
}
}
}
},
"v1OrgSearchResponse": {
"type": "object",
"properties": {
"offset": {
"type": "string",
"format": "uint64"
},
"limit": {
"type": "string",
"format": "uint64"
},
"total_result": {
"type": "string",
"format": "uint64"
},
"result": {
"type": "array",
"items": {
"$ref": "#/definitions/v1Org"
}
}
}
},
"v1OrgSetUpRequest": {
"type": "object",
"properties": {
"org": {
"$ref": "#/definitions/v1CreateOrgRequest"
},
"user": {
"$ref": "#/definitions/v1RegisterUserRequest"
}
}
},
"v1OrgSetUpResponse": {
"type": "object",
"properties": {
"org": {
"$ref": "#/definitions/v1Org"
},
"user": {
"$ref": "#/definitions/v1User"
}
}
},
"v1OrgState": {
"type": "string",
"enum": [
"ORGSTATE_UNSPECIFIED",
"ORGSTATE_ACTIVE",
"ORGSTATE_INACTIVE"
],
"default": "ORGSTATE_UNSPECIFIED"
},
"v1RegisterUserRequest": {
"type": "object",
"properties": {
"email": {
"type": "string"
},
"first_name": {
"type": "string"
},
"last_name": {
"type": "string"
},
"nick_name": {
"type": "string"
},
"display_name": {
"type": "string"
},
"preferred_language": {
"type": "string"
},
"gender": {
"$ref": "#/definitions/v1Gender"
},
"password": {
"type": "string"
},
"org_id": {
"type": "string"
}
}
},
"v1UniqueOrgResponse": {
"type": "object",
"properties": {
"is_unique": {
"type": "boolean",
"format": "boolean"
}
}
},
"v1User": {
"type": "object",
"properties": {
"id": {
"type": "string"
},
"state": {
"$ref": "#/definitions/v1UserState"
},
"creation_date": {
"type": "string",
"format": "date-time"
},
"change_date": {
"type": "string",
"format": "date-time"
},
"user_name": {
"type": "string"
},
"first_name": {
"type": "string"
},
"last_name": {
"type": "string"
},
"nick_name": {
"type": "string"
},
"display_name": {
"type": "string"
},
"preferred_language": {
"type": "string"
},
"gender": {
"$ref": "#/definitions/v1Gender"
},
"email": {
"type": "string"
},
"isEmailVerified": {
"type": "boolean",
"format": "boolean"
},
"phone": {
"type": "string"
},
"isPhoneVerified": {
"type": "boolean",
"format": "boolean"
},
"country": {
"type": "string"
},
"locality": {
"type": "string"
},
"postal_code": {
"type": "string"
},
"region": {
"type": "string"
},
"street_address": {
"type": "string"
}
}
},
"v1UserState": {
"type": "string",
"enum": [
"USERSTATE_UNSPECIFIED",
"USERSTATE_ACTIVE",
"USERSTATE_INACTIVE",
"USERSTATE_DELETED",
"USERSTATE_LOCKED",
"USERSTATE_SUSPEND",
"USERSTATE_INITIAL"
],
"default": "USERSTATE_UNSPECIFIED"
}
}
}

View File

@ -1,6 +1,6 @@
package grpc
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto
//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/citadel/admin/api/grpc AdminServiceClient
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto
//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/zitadel/admin/api/grpc AdminServiceClient
//go:generate ../../../console/etc/generate-grpc.sh

View File

@ -1,12 +1,12 @@
// Code generated by MockGen. DO NOT EDIT.
// Source: github.com/caos/citadel/admin/api/grpc (interfaces: AdminServiceClient)
// Source: github.com/caos/zitadel/admin/api/grpc (interfaces: AdminServiceClient)
// Package api is a generated GoMock package.
package api
import (
context "context"
grpc "github.com/caos/citadel/admin/api/grpc"
grpc "github.com/caos/zitadel/admin/api/grpc"
gomock "github.com/golang/mock/gomock"
empty "github.com/golang/protobuf/ptypes/empty"
struct0 "github.com/golang/protobuf/ptypes/struct"

View File

@ -5,6 +5,7 @@ import "google/api/annotations.proto";
import "google/protobuf/empty.proto";
import "google/protobuf/timestamp.proto";
import "google/protobuf/struct.proto";
import "validate/validate.proto";
import "protoc-gen-swagger/options/annotations.proto";
import "authoption/options.proto";

View File

@ -1,5 +1,5 @@
package grpc
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto
//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/citadel/auth/api/grpc AuthServiceClient
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto
//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/zitadel/auth/api/grpc AuthServiceClient
//go:generate ../../../console/etc/generate-grpc.sh

View File

@ -4,19 +4,20 @@ import "google/api/annotations.proto";
import "google/protobuf/empty.proto";
import "google/protobuf/struct.proto";
import "google/protobuf/timestamp.proto";
import "validate/validate.proto";
import "protoc-gen-swagger/options/annotations.proto";
import "authoption/options.proto";
package zitadel.auth.api.v1;
option go_package = "github.com/caos/citadel/auth/api/grpc";
option go_package = "github.com/caos/zitadel/auth/api/grpc";
option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = {
info: {
title: "Auth API";
version: "0.1";
contact:{
url: "https://github.com/caos/citadel/auth"
url: "https://github.com/caos/zitadel/auth"
};
};
@ -134,7 +135,7 @@ service AuthService {
get: "/me/usersessions"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -178,7 +179,7 @@ service AuthService {
get: "/users/me/profile"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -189,7 +190,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -199,7 +200,7 @@ service AuthService {
get: "/users/me/email"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -210,7 +211,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -221,7 +222,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -240,7 +241,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -258,7 +259,7 @@ service AuthService {
get: "/users/me/phone"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -269,7 +270,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -280,7 +281,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -291,7 +292,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -301,7 +302,7 @@ service AuthService {
get: "/users/me/address"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -312,7 +313,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -322,7 +323,7 @@ service AuthService {
get: "/users/me/mfas"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -334,7 +335,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -359,7 +360,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -370,7 +371,7 @@ service AuthService {
post: "/users/me/mfa/otp"
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -381,7 +382,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -391,7 +392,7 @@ service AuthService {
delete: "/users/me/mfa/otp"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -446,7 +447,7 @@ service AuthService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
@ -456,18 +457,18 @@ service AuthService {
get: "/global/_isiamadmin"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}
//Permission
rpc GetMyCitadelPermissions(google.protobuf.Empty) returns (MyPermissions) {
rpc GetMyZitadelPermissions(google.protobuf.Empty) returns (MyPermissions) {
option (google.api.http) = {
get: "/permissions/zitadel/me"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "authenticated"
};
}

View File

@ -1,6 +1,6 @@
package grpc
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto
//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/citadel/management/api/grpc ManagementServiceClient
//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto
//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/management/api/grpc ManagementServiceClient
//go:generate ../../../console/etc/generate-grpc.sh

View File

@ -5,8 +5,8 @@ package grpc
import (
"google.golang.org/grpc"
utils_auth "github.com/caos/citadel/utils/auth"
utils_grpc "github.com/caos/citadel/utils/grpc"
utils_auth "github.com/caos/zitadel/internal/auth"
utils_grpc "github.com/caos/zitadel/internal/grpc"
)
/**
@ -15,502 +15,502 @@ import (
var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{
"/caos.citadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{
Permission: "user.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{
Permission: "org.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{
Permission: "org.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{
Permission: "org.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{
Permission: "org.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{
Permission: "org.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{
Permission: "org.member.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{
Permission: "org.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{
Permission: "project.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{
Permission: "project.member.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{
Permission: "project.member.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{
Permission: "project.member.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{
Permission: "project.member.delete",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{
Permission: "project.role.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{
Permission: "project.role.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{
Permission: "project.role.delete",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{
Permission: "project.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{
Permission: "project.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{
Permission: "project.grant.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{
Permission: "project.grant.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{
Permission: "user.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{
Permission: "user.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{
Permission: "project.user.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{
Permission: "project.user.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{
Permission: "project.grant.user.grant.read",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{
Permission: "project.grant.user.grant.read",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{
"/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},

View File

@ -4,7 +4,7 @@
"title": "Management API",
"version": "0.1",
"contact": {
"url": "https://github.com/caos/citadel/management"
"url": "https://github.com/caos/zitadel/management"
}
},
"schemes": [

View File

@ -1,12 +1,12 @@
// Code generated by MockGen. DO NOT EDIT.
// Source: github.com/caos/citadel/management/api/grpc (interfaces: ManagementServiceClient)
// Source: github.com/caos/zitadel/management/api/grpc (interfaces: ManagementServiceClient)
// Package api is a generated GoMock package.
package api
import (
context "context"
grpc "github.com/caos/citadel/management/api/grpc"
grpc "github.com/caos/zitadel/management/api/grpc"
gomock "github.com/golang/mock/gomock"
empty "github.com/golang/protobuf/ptypes/empty"
struct0 "github.com/golang/protobuf/ptypes/struct"

View File

@ -9,26 +9,26 @@ import "validate/validate.proto";
import "google/protobuf/descriptor.proto";
import "authoption/options.proto";
package caos.citadel.management.api.v1;
package caos.zitadel.management.api.v1;
option go_package = "github.com/caos/citadel/management/api/grpc";
option go_package = "github.com/caos/zitadel/management/api/grpc";
option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = {
info: {
title: "Management API";
version: "0.1";
contact:{
url: "https://github.com/caos/citadel/management"
};
};
version: "0.1";
contact:{
url: "https://github.com/caos/zitadel/management"
};
};
schemes: HTTPS;
schemes: HTTPS;
consumes: "application/json";
consumes: "application/grpc";
consumes: "application/json";
consumes: "application/grpc";
produces: "application/json";
produces: "application/grpc";
produces: "application/json";
produces: "application/grpc";
};
service ManagementService {
@ -57,7 +57,7 @@ service ManagementService {
get: "/users/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -67,7 +67,7 @@ service ManagementService {
get: "/global/users/email/{email}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -78,7 +78,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -88,7 +88,7 @@ service ManagementService {
get: "/users/_isunique"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -99,7 +99,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -110,7 +110,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -121,7 +121,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -132,7 +132,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -143,7 +143,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -153,7 +153,7 @@ service ManagementService {
delete: "/users/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.delete"
};
}
@ -163,7 +163,7 @@ service ManagementService {
get: "/users/{id}/changes"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -173,7 +173,7 @@ service ManagementService {
get: "/applications/{id}/changes"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
};
}
@ -183,7 +183,7 @@ service ManagementService {
get: "/orgs/{id}/changes"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
@ -193,7 +193,7 @@ service ManagementService {
get: "/projects/{id}/changes"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
@ -204,7 +204,7 @@ service ManagementService {
get: "/users/{id}/profile"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -215,7 +215,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -226,7 +226,7 @@ service ManagementService {
get: "/users/{id}/email"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -237,7 +237,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -248,7 +248,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -259,7 +259,7 @@ service ManagementService {
get: "/users/{id}/phone"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -270,7 +270,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -281,7 +281,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -292,7 +292,7 @@ service ManagementService {
get: "/users/{id}/address"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -303,7 +303,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -313,7 +313,7 @@ service ManagementService {
get: "/users/{id}/mfas"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
@ -326,7 +326,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -338,7 +338,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
@ -350,7 +350,7 @@ service ManagementService {
get: "/policies/passwords/complexity"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
@ -361,7 +361,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -372,7 +372,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -382,7 +382,7 @@ service ManagementService {
delete: "/policies/passwords/complexity/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
@ -393,7 +393,7 @@ service ManagementService {
get: "/policies/passwords/age"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
@ -404,7 +404,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -415,7 +415,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -425,7 +425,7 @@ service ManagementService {
delete: "/policies/passwords/age/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
@ -436,7 +436,7 @@ service ManagementService {
get: "/policies/passwords/lockout"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
@ -447,7 +447,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -458,7 +458,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
@ -468,7 +468,7 @@ service ManagementService {
delete: "/policies/passwords/lockout/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
@ -479,7 +479,7 @@ service ManagementService {
get: "/orgs/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
@ -489,7 +489,7 @@ service ManagementService {
get: "/global/orgs/domain/{domain}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
@ -500,7 +500,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.write"
};
}
@ -511,7 +511,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.write"
};
}
@ -522,7 +522,7 @@ service ManagementService {
get: "/orgs/members/roles"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.read"
};
}
@ -533,7 +533,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.write"
};
}
@ -544,7 +544,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.write"
};
}
@ -554,7 +554,7 @@ service ManagementService {
delete: "/orgs/{org_id}/members/{user_id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.delete"
};
}
@ -565,7 +565,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.read"
};
}
@ -577,7 +577,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
@ -587,7 +587,7 @@ service ManagementService {
get: "/projects/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
check_field_name: "Id"
};
@ -599,7 +599,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
};
}
@ -610,7 +610,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
@ -622,7 +622,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
@ -634,7 +634,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
@ -646,7 +646,7 @@ service ManagementService {
get: "/grants/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
@ -657,7 +657,7 @@ service ManagementService {
get: "/projects/members/roles"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.read"
};
}
@ -668,7 +668,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.read"
check_field_name: "ProjectId"
};
@ -680,7 +680,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.write"
check_field_name: "Id"
};
@ -692,7 +692,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.write"
check_field_name: "Id"
};
@ -703,7 +703,7 @@ service ManagementService {
delete: "/projects/{id}/members/{user_id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.delete"
check_field_name: "Id"
};
@ -716,7 +716,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.read"
check_field_name: "ProjectId"
};
@ -728,7 +728,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.write"
check_field_name: "Id"
};
@ -739,7 +739,7 @@ service ManagementService {
delete: "/projects/{id}/roles/{name}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.delete"
check_field_name: "Id"
};
@ -752,7 +752,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
check_field_name: "ProjectId"
};
@ -763,7 +763,7 @@ service ManagementService {
get: "/projects/{project_id}/applications/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
check_field_name: "ProjectId"
};
@ -775,7 +775,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -787,7 +787,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -799,7 +799,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -811,7 +811,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -823,7 +823,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -835,7 +835,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
@ -848,7 +848,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.read"
check_field_name: "ProjectId"
};
@ -859,7 +859,7 @@ service ManagementService {
get: "/projects/{project_id}/grants/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.read"
};
}
@ -870,7 +870,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
@ -881,7 +881,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
@ -892,7 +892,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
@ -903,7 +903,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
@ -915,7 +915,7 @@ service ManagementService {
get: "/projects/grants/members/roles"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.read"
};
}
@ -925,7 +925,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.read"
};
}
@ -936,7 +936,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.write"
};
}
@ -947,7 +947,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.write"
};
}
@ -957,7 +957,7 @@ service ManagementService {
delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.delete"
};
}
@ -970,7 +970,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.read"
};
}
@ -980,7 +980,7 @@ service ManagementService {
get: "/users/{user_id}/grants/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.read"
};
}
@ -991,7 +991,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
@ -1002,7 +1002,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
@ -1013,7 +1013,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
@ -1024,7 +1024,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
@ -1036,7 +1036,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.read"
check_field_name: "ProjectId"
};
@ -1047,7 +1047,7 @@ service ManagementService {
get: "/projects/{project_id}/users/{user_id}/grants/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.read"
check_field_name: "ProjectId"
};
@ -1059,7 +1059,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
@ -1071,7 +1071,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
@ -1083,7 +1083,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
@ -1095,7 +1095,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
@ -1107,7 +1107,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.read"
check_field_name: "ProjectGrantId"
};
@ -1118,7 +1118,7 @@ service ManagementService {
get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.read"
check_field_name: "ProjectGrantId"
};
@ -1130,7 +1130,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
@ -1142,7 +1142,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
@ -1154,7 +1154,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
@ -1166,7 +1166,7 @@ service ManagementService {
body: "*"
};
option (caos.citadel.utils.v1.auth_option) = {
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};