diff --git a/.gitignore b/.gitignore index 192669f97e..e4f3db01e5 100644 --- a/.gitignore +++ b/.gitignore @@ -20,4 +20,8 @@ debug # IDE .idea -.vscode \ No newline at end of file +.vscode + +# credential +google-credentials +key.json \ No newline at end of file diff --git a/cmd/zitadel/main.go b/cmd/zitadel/main.go index fc5f748139..17c108d930 100644 --- a/cmd/zitadel/main.go +++ b/cmd/zitadel/main.go @@ -44,20 +44,17 @@ func main() { ctx := context.Background() if *managementEnabled { - err = management.Start(ctx, conf.Mgmt, conf.AuthZ) - logging.Log("MAIN-39Nv5").OnError(err).Fatal("error starting management api") + management.Start(ctx, conf.Mgmt, conf.AuthZ) } if *authEnabled { - err = auth.Start(ctx, conf.Auth, conf.AuthZ) - logging.Log("MAIN-x0nD2").OnError(err).Fatal("error starting auth api") + auth.Start(ctx, conf.Auth, conf.AuthZ) } if *loginEnabled { err = login.Start(ctx, conf.Login) logging.Log("MAIN-53RF2").OnError(err).Fatal("error starting login ui") } if *adminEnabled { - err = admin.Start(ctx, conf.Admin, conf.AuthZ) - logging.Log("MAIN-0na71").OnError(err).Fatal("error starting admin api") + admin.Start(ctx, conf.Admin, conf.AuthZ) } if *consoleEnabled { err = console.Start(ctx, conf.Console) diff --git a/go.mod b/go.mod index 4f7af60649..b4ce9ed1ba 100644 --- a/go.mod +++ b/go.mod @@ -11,10 +11,11 @@ require ( github.com/Masterminds/sprig v2.22.0+incompatible github.com/aws/aws-sdk-go v1.29.16 // indirect github.com/caos/logging v0.0.1 + github.com/envoyproxy/protoc-gen-validate v0.1.0 github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 - github.com/golang/protobuf v1.3.5 + github.com/golang/protobuf v1.4.0-rc.4 github.com/google/uuid v1.1.1 // indirect github.com/gorilla/schema v1.1.0 github.com/gorilla/securecookie v1.1.1 @@ -34,7 +35,8 @@ require ( golang.org/x/text v0.3.2 golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56 google.golang.org/api v0.20.0 // indirect - google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c // indirect + google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 + google.golang.org/protobuf v1.20.1 gopkg.in/yaml.v2 v2.2.8 // indirect ) diff --git a/go.sum b/go.sum index f253cef29c..35f95765e3 100644 --- a/go.sum +++ b/go.sum @@ -47,6 +47,7 @@ github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSs github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= +github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrpgBZ1R8UNe3ddc+A= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= @@ -75,6 +76,11 @@ github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5y github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= github.com/golang/protobuf v1.3.5 h1:F768QJ1E9tib+q5Sc8MkdJi1RxLTbRcTf8LJV56aRls= github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk= +github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8= +github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA= +github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs= +github.com/golang/protobuf v1.4.0-rc.4 h1:+EOh4OY6tjM6ZueeUKinl1f0U2820HzQOuf1iqMnsks= +github.com/golang/protobuf v1.4.0-rc.4/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w= github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= @@ -323,6 +329,12 @@ google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8 google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= google.golang.org/grpc v1.28.0 h1:bO/TA4OxCOummhSf10siHuG7vJOiwh7SpRpFZDkOgl4= google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60= +google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= +google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= +google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM= +google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE= +google.golang.org/protobuf v1.20.1 h1:ESRXHgpUBG5D2I5mmsQIyYxB/tQIZfSZ8wLyFDf/N/U= +google.golang.org/protobuf v1.20.1/go.mod h1:KqelGeouBkcbcuB3HCk4/YH2tmNLk6YSWA5LIWeI/lY= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index 9daad6521c..6b2bb1b415 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -68,7 +68,7 @@ func (fi bindataFileInfo) Sys() interface{} { return nil } -var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x52\xc1\x6a\xe3\x30\x10\x3d\xaf\xbe\x62\x30\x3e\xb4\x21\x95\xd8\x6b\xa0\x87\x25\xdd\x2e\x3d\xb4\x09\x6c\x76\xaf\x41\xb5\x27\xb2\x88\x2d\x19\x49\x0e\xb4\x42\xff\xbe\x8c\xed\xac\x9d\xb4\x0b\xeb\x93\xac\x99\x37\xef\xbd\xd1\x13\x02\xd6\xb6\x44\x50\x68\xd0\xc9\x80\x25\xbc\xbe\x41\xeb\x6c\xb0\xc5\x9d\x42\x73\x27\xbb\x50\x35\x18\x2a\x5b\x72\x78\xd8\xc0\xcb\x66\x07\xdf\x1f\x9e\x76\x9c\xb1\x56\x16\x47\xa9\x10\x62\xe4\x8f\xba\x46\xfe\xc3\x6e\x8f\x8a\xbf\xc8\x06\x53\x62\x8c\xe9\xa6\xb5\x2e\xc0\x0d\x03\x00\xc8\x94\xb5\xaa\x46\xae\x6c\x2d\x8d\xe2\xd6\x29\xa1\x5c\x5b\x64\x7d\x91\x7d\xe9\x82\xae\xfd\x9e\xa8\x20\x53\x3a\x54\xdd\x2b\x2f\x6c\x23\x0a\x69\xbd\x78\xd7\x41\x96\x58\x0b\x6d\x02\x3a\x23\x6b\x41\x6d\xd9\x19\x43\x53\xfe\x03\x33\x90\xdd\x32\x16\x23\x38\x69\x14\x42\xee\x61\x75\x0f\x83\xf2\x9f\xe8\x4e\xba\x40\x0f\x24\x5c\x2c\x16\x0c\x16\x10\x63\xee\xcf\x66\x60\x21\x18\x3b\x49\x37\xbf\xdc\x7f\xeb\x42\xf5\xdc\x2f\xc6\xc3\x3d\x4c\x0e\xf8\x54\x78\x96\x6d\xab\x8d\x82\xd8\xdb\x9c\xa8\x1b\xa2\xce\x3d\x1f\xba\x88\x60\xfc\x62\x84\xbc\x21\xfc\xa6\x0d\xd4\x63\xdb\xa0\xad\x81\xbc\xe1\x9b\xfe\xe4\x21\x23\x7f\x7c\xf4\xc7\x7b\x56\x7e\xfa\xca\x89\x78\x3f\x74\x67\x70\x39\x50\x1f\x40\x9a\x72\x36\xf7\xef\x89\x6f\xd1\x35\xda\x7b\xa2\x98\x61\xfa\xf7\x12\x31\xe6\xc3\x72\xb6\xc3\x33\xa7\xc4\x67\xee\x45\x8c\xe3\x29\x5b\x5d\x7b\x1f\xa4\xc6\x8b\x79\xf4\x4d\x6c\x2b\xc8\x62\xfc\x4c\x46\x4a\xd9\xf2\x03\x6e\x5d\x61\x71\xdc\x4a\x27\x9b\x2b\x5c\x5f\x78\xd4\x58\x97\xa3\x94\x4b\x6c\x5a\xce\xd6\x80\xe6\xbc\xe7\x18\x61\xf8\x49\x8c\x1d\x3a\x53\x7c\x78\x54\xeb\xf4\xbb\x24\x0b\xfb\x27\x8a\x4f\x81\x6d\xb0\xee\xe6\x84\x4e\x1f\x34\xba\xb9\xdb\x9d\x3d\xa2\xf9\x3d\x16\x96\x40\x77\x6b\x6b\x0e\xb0\xb8\xda\x08\x5d\x6a\x75\x0b\x94\x42\xfe\xcb\x48\xf7\x46\x89\x43\x37\x9b\x3f\x66\xc4\x61\xe8\x9c\x81\x29\xdb\xfc\x42\xd1\x67\x82\x26\xde\xe5\xbf\xf2\x79\x4b\x5e\x07\xdf\x90\xd2\x9f\x00\x00\x00\xff\xff\xbf\x91\xbb\x3b\xf2\x03\x00\x00") +var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd5\x53\x10\x86\x0f\x4d\x90\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xd0\x6c\xd7\x40\xb5\x19\x45\x88\x2d\x09\x94\x9c\xa1\x15\xf4\xee\x83\x6c\x77\x71\xd6\x0e\x98\x4f\x32\x45\xf2\xe7\x47\xfd\x42\xc0\xca\xd6\x08\x0a\x0d\x92\x0c\x58\xc3\xcb\x2b\x38\xb2\xc1\x56\x37\x0a\xcd\x8d\xec\xc2\xa1\xc5\x70\xb0\x35\x87\xbb\x35\x3c\xad\xb7\xf0\xed\xee\x61\xcb\x19\x73\xb2\x3a\x4a\x85\x10\x23\xbf\xd7\x0d\xf2\xef\x76\x73\x54\xfc\x49\xb6\x98\x12\x63\x4c\xb7\xce\x52\x80\x6b\x06\x00\x50\x28\x6b\x55\x83\x5c\xd9\x46\x1a\xc5\x2d\x29\xa1\xc8\x55\x45\x7f\xc9\xae\xba\xa0\x1b\xbf\xcb\x52\x50\x28\x1d\x0e\xdd\x0b\xaf\x6c\x2b\x2a\x69\xbd\x78\xd3\x41\xd6\xd8\x08\x6d\x02\x92\x91\x8d\x90\x4e\x8b\x9c\x5a\xb0\xab\xff\x4b\xce\x4a\xc2\x23\x9d\x90\x44\xab\xeb\xba\xc1\x5f\x92\xb0\x60\x33\xc6\x62\x04\x92\x46\x21\x94\x1e\x96\xb7\x30\x80\x3c\x23\x9d\x74\x85\x1e\x32\x87\x98\xcf\x19\xcc\x21\xc6\xd2\xbf\xb3\xc1\x5c\x30\x76\x92\x34\x0d\xee\xbe\x76\xe1\xf0\xd8\xef\xc9\xc3\x2d\x9c\x81\xf8\x10\x7c\x94\xce\x69\xa3\x20\xf6\xc4\x67\xd9\x36\xcb\x96\x7e\xcc\xca\xcd\xc7\x2f\x46\x28\xdb\xdc\x74\xed\x42\xce\xb1\x2e\x68\x6b\xa0\x6c\xf9\xba\x3f\x79\x28\x32\x31\x1f\x89\x79\xaf\xc8\x4f\x5f\x78\x16\xdd\x0d\xd9\x05\x5c\x36\xd4\x7b\x90\xa6\x9e\xf4\xfd\x73\xe2\x1b\xa4\x56\x7b\x9f\x25\x26\x35\xfd\xd3\x89\x18\xcb\x61\x31\x9b\xe1\xc5\x53\xe2\x13\x72\x11\xe3\x78\x2a\x96\x53\xee\x61\xcc\x78\xd1\x2b\x7f\x67\xa5\x25\x14\x31\x7e\x36\x42\x4a\xc5\xe2\x43\xdd\xea\x80\xd5\x71\x23\x49\xb6\x7f\xd5\xf5\x17\xf7\x1a\x9b\x7a\x1c\xe3\xb2\x36\x2d\x26\x2b\x40\xf3\xbe\xe3\x18\x61\xf8\x49\x8c\xed\x3b\x53\x7d\x78\x4c\x4b\xfa\x4d\x66\x84\xdd\x43\x36\x53\x85\x2e\x58\xba\x3e\x21\xe9\xbd\x46\x9a\x92\x6e\xed\x11\xcd\xcf\xf1\x62\x01\x39\xb6\xb2\x66\x0f\xf3\x49\x4e\x0e\x68\x35\x83\xec\x45\xfe\xc3\x48\x7a\x7d\xee\x0d\x39\xe9\x3d\x7a\x83\x30\x74\x64\xe0\x6c\x54\x7e\x31\xcd\x67\xc3\x9c\x35\x17\xff\xf2\xe4\x2c\x73\x0e\xcc\x90\xd2\xef\x00\x00\x00\xff\xff\xf3\xc0\x3d\x9c\xf5\x03\x00\x00") func templatesAuth_method_mappingGoTmplBytes() ([]byte, error) { return bindataRead( @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584960713, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1013, mode: os.FileMode(420), modTime: time.Unix(1585129064, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl index 031dae21ee..b08d37acdd 100644 --- a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl +++ b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl @@ -6,8 +6,8 @@ package {{.File.GoPkg.Name}} import ( "google.golang.org/grpc" - utils_auth "github.com/caos/zitadel/internal/auth" - utils_grpc "github.com/caos/zitadel/internal/grpc" + utils_auth "github.com/caos/zitadel/internal/api/auth" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) {{ range $s := .File.Services }} @@ -16,11 +16,11 @@ import ( * {{$s.Name}} */ -var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { +var {{$s.Name}}_AuthMethods = utils_auth.MethodMapping { {{ range $m := $s.Method}} {{ $mAuthOpt := option $m.Options "caos.zitadel.utils.v1.auth_option" }} {{ if and $mAuthOpt $mAuthOpt.Permission }} - "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.AuthOption{ + "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.Option{ Permission: "{{$mAuthOpt.Permission}}", CheckParam: "{{$mAuthOpt.CheckFieldName}}", }, @@ -28,8 +28,8 @@ var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { {{ end}} } -func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) +func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return middleware.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) } {{ end }} \ No newline at end of file diff --git a/pkg/admin/admin.go b/pkg/admin/admin.go index 0a18a4b145..a21970d817 100644 --- a/pkg/admin/admin.go +++ b/pkg/admin/admin.go @@ -2,10 +2,8 @@ package admin import ( "context" - app "github.com/caos/zitadel/internal/admin" "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/admin/api" ) @@ -14,6 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "ADMIN-n8vw5", "not implemented yet") //TODO: implement +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) } diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go new file mode 100644 index 0000000000..c197885dfb --- /dev/null +++ b/pkg/admin/api/api.go @@ -0,0 +1,20 @@ +package api + +import ( + "context" + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/admin/api/grpc" +) + +type Config struct { + GRPC grpc_util.Config +} + +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) + + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) +} diff --git a/pkg/admin/api/config.go b/pkg/admin/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/admin/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go new file mode 100644 index 0000000000..e7c24e6727 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -0,0 +1,41 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" +) + +/** + * AdminService + */ + +var AdminService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.Option{ + Permission: "iam.write", + CheckParam: "", + }, +} + +func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return middleware.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) +} diff --git a/pkg/admin/api/grpc/admin.pb.go b/pkg/admin/api/grpc/admin.pb.go new file mode 100644 index 0000000000..2b22bc25b2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.go @@ -0,0 +1,1451 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: admin.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +type OrgSearchKey int32 + +const ( + OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED OrgSearchKey = 0 + OrgSearchKey_ORGSEARCHKEY_ORG_NAME OrgSearchKey = 1 + OrgSearchKey_ORGSEARCHKEY_DOMAIN OrgSearchKey = 2 + OrgSearchKey_ORGSEARCHKEY_STATE OrgSearchKey = 3 +) + +var OrgSearchKey_name = map[int32]string{ + 0: "ORGSEARCHKEY_UNSPECIFIED", + 1: "ORGSEARCHKEY_ORG_NAME", + 2: "ORGSEARCHKEY_DOMAIN", + 3: "ORGSEARCHKEY_STATE", +} + +var OrgSearchKey_value = map[string]int32{ + "ORGSEARCHKEY_UNSPECIFIED": 0, + "ORGSEARCHKEY_ORG_NAME": 1, + "ORGSEARCHKEY_DOMAIN": 2, + "ORGSEARCHKEY_STATE": 3, +} + +func (x OrgSearchKey) String() string { + return proto.EnumName(OrgSearchKey_name, int32(x)) +} + +func (OrgSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +type OrgSearchMethod int32 + +const ( + OrgSearchMethod_ORGSEARCHMETHOD_EQUALS OrgSearchMethod = 0 + OrgSearchMethod_ORGSEARCHMETHOD_STARTS_WITH OrgSearchMethod = 1 + OrgSearchMethod_ORGSEARCHMETHOD_CONTAINS OrgSearchMethod = 2 +) + +var OrgSearchMethod_name = map[int32]string{ + 0: "ORGSEARCHMETHOD_EQUALS", + 1: "ORGSEARCHMETHOD_STARTS_WITH", + 2: "ORGSEARCHMETHOD_CONTAINS", +} + +var OrgSearchMethod_value = map[string]int32{ + "ORGSEARCHMETHOD_EQUALS": 0, + "ORGSEARCHMETHOD_STARTS_WITH": 1, + "ORGSEARCHMETHOD_CONTAINS": 2, +} + +func (x OrgSearchMethod) String() string { + return proto.EnumName(OrgSearchMethod_name, int32(x)) +} + +func (OrgSearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UniqueOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgRequest) Reset() { *m = UniqueOrgRequest{} } +func (m *UniqueOrgRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgRequest) ProtoMessage() {} +func (*UniqueOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +func (m *UniqueOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgRequest.Unmarshal(m, b) +} +func (m *UniqueOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgRequest.Marshal(b, m, deterministic) +} +func (m *UniqueOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgRequest.Merge(m, src) +} +func (m *UniqueOrgRequest) XXX_Size() int { + return xxx_messageInfo_UniqueOrgRequest.Size(m) +} +func (m *UniqueOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgRequest proto.InternalMessageInfo + +func (m *UniqueOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *UniqueOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type UniqueOrgResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgResponse) Reset() { *m = UniqueOrgResponse{} } +func (m *UniqueOrgResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgResponse) ProtoMessage() {} +func (*UniqueOrgResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +func (m *UniqueOrgResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgResponse.Unmarshal(m, b) +} +func (m *UniqueOrgResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgResponse.Marshal(b, m, deterministic) +} +func (m *UniqueOrgResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgResponse.Merge(m, src) +} +func (m *UniqueOrgResponse) XXX_Size() int { + return xxx_messageInfo_UniqueOrgResponse.Size(m) +} +func (m *UniqueOrgResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgResponse proto.InternalMessageInfo + +func (m *UniqueOrgResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn OrgSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*OrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchRequest) Reset() { *m = OrgSearchRequest{} } +func (m *OrgSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSearchRequest) ProtoMessage() {} +func (*OrgSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +func (m *OrgSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchRequest.Unmarshal(m, b) +} +func (m *OrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchRequest.Merge(m, src) +} +func (m *OrgSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgSearchRequest.Size(m) +} +func (m *OrgSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchRequest proto.InternalMessageInfo + +func (m *OrgSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchRequest) GetSortingColumn() OrgSearchKey { + if m != nil { + return m.SortingColumn + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *OrgSearchRequest) GetQueries() []*OrgSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgSearchQuery struct { + Key OrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"key,omitempty"` + Method OrgSearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.admin.api.v1.OrgSearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchQuery) Reset() { *m = OrgSearchQuery{} } +func (m *OrgSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgSearchQuery) ProtoMessage() {} +func (*OrgSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{5} +} + +func (m *OrgSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchQuery.Unmarshal(m, b) +} +func (m *OrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchQuery.Merge(m, src) +} +func (m *OrgSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgSearchQuery.Size(m) +} +func (m *OrgSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchQuery proto.InternalMessageInfo + +func (m *OrgSearchQuery) GetKey() OrgSearchKey { + if m != nil { + return m.Key + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchQuery) GetMethod() OrgSearchMethod { + if m != nil { + return m.Method + } + return OrgSearchMethod_ORGSEARCHMETHOD_EQUALS +} + +func (m *OrgSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type OrgSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchResponse) Reset() { *m = OrgSearchResponse{} } +func (m *OrgSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSearchResponse) ProtoMessage() {} +func (*OrgSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{6} +} + +func (m *OrgSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchResponse.Unmarshal(m, b) +} +func (m *OrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchResponse.Merge(m, src) +} +func (m *OrgSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgSearchResponse.Size(m) +} +func (m *OrgSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchResponse proto.InternalMessageInfo + +func (m *OrgSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgSearchResponse) GetResult() []*Org { + if m != nil { + return m.Result + } + return nil +} + +type OrgSetUpRequest struct { + Org *CreateOrgRequest `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *RegisterUserRequest `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpRequest) Reset() { *m = OrgSetUpRequest{} } +func (m *OrgSetUpRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpRequest) ProtoMessage() {} +func (*OrgSetUpRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{7} +} + +func (m *OrgSetUpRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpRequest.Unmarshal(m, b) +} +func (m *OrgSetUpRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpRequest.Marshal(b, m, deterministic) +} +func (m *OrgSetUpRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpRequest.Merge(m, src) +} +func (m *OrgSetUpRequest) XXX_Size() int { + return xxx_messageInfo_OrgSetUpRequest.Size(m) +} +func (m *OrgSetUpRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpRequest proto.InternalMessageInfo + +func (m *OrgSetUpRequest) GetOrg() *CreateOrgRequest { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpRequest) GetUser() *RegisterUserRequest { + if m != nil { + return m.User + } + return nil +} + +type OrgSetUpResponse struct { + Org *Org `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *User `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpResponse) Reset() { *m = OrgSetUpResponse{} } +func (m *OrgSetUpResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpResponse) ProtoMessage() {} +func (*OrgSetUpResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{8} +} + +func (m *OrgSetUpResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpResponse.Unmarshal(m, b) +} +func (m *OrgSetUpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpResponse.Marshal(b, m, deterministic) +} +func (m *OrgSetUpResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpResponse.Merge(m, src) +} +func (m *OrgSetUpResponse) XXX_Size() int { + return xxx_messageInfo_OrgSetUpResponse.Size(m) +} +func (m *OrgSetUpResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpResponse proto.InternalMessageInfo + +func (m *OrgSetUpResponse) GetOrg() *Org { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpResponse) GetUser() *User { + if m != nil { + return m.User + } + return nil +} + +type RegisterUserRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } +func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserRequest) ProtoMessage() {} +func (*RegisterUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{9} +} + +func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) +} +func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserRequest.Merge(m, src) +} +func (m *RegisterUserRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserRequest.Size(m) +} +func (m *RegisterUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo + +func (m *RegisterUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *RegisterUserRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,6,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,7,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,8,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,9,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,10,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,11,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,13,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` + Phone string `protobuf:"bytes,14,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,15,opt,name=isPhoneVerified,proto3" json:"isPhoneVerified,omitempty"` + Country string `protobuf:"bytes,16,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,17,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,18,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,19,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,20,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type CreateOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateOrgRequest) Reset() { *m = CreateOrgRequest{} } +func (m *CreateOrgRequest) String() string { return proto.CompactTextString(m) } +func (*CreateOrgRequest) ProtoMessage() {} +func (*CreateOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{11} +} + +func (m *CreateOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateOrgRequest.Unmarshal(m, b) +} +func (m *CreateOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateOrgRequest.Marshal(b, m, deterministic) +} +func (m *CreateOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateOrgRequest.Merge(m, src) +} +func (m *CreateOrgRequest) XXX_Size() int { + return xxx_messageInfo_CreateOrgRequest.Size(m) +} +func (m *CreateOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateOrgRequest proto.InternalMessageInfo + +func (m *CreateOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *CreateOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +func init() { + proto.RegisterEnum("zitadel.admin.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchKey", OrgSearchKey_name, OrgSearchKey_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchMethod", OrgSearchMethod_name, OrgSearchMethod_value) + proto.RegisterEnum("zitadel.admin.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("zitadel.admin.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterType((*OrgID)(nil), "zitadel.admin.api.v1.OrgID") + proto.RegisterType((*UniqueOrgRequest)(nil), "zitadel.admin.api.v1.UniqueOrgRequest") + proto.RegisterType((*UniqueOrgResponse)(nil), "zitadel.admin.api.v1.UniqueOrgResponse") + proto.RegisterType((*Org)(nil), "zitadel.admin.api.v1.Org") + proto.RegisterType((*OrgSearchRequest)(nil), "zitadel.admin.api.v1.OrgSearchRequest") + proto.RegisterType((*OrgSearchQuery)(nil), "zitadel.admin.api.v1.OrgSearchQuery") + proto.RegisterType((*OrgSearchResponse)(nil), "zitadel.admin.api.v1.OrgSearchResponse") + proto.RegisterType((*OrgSetUpRequest)(nil), "zitadel.admin.api.v1.OrgSetUpRequest") + proto.RegisterType((*OrgSetUpResponse)(nil), "zitadel.admin.api.v1.OrgSetUpResponse") + proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.admin.api.v1.RegisterUserRequest") + proto.RegisterType((*User)(nil), "zitadel.admin.api.v1.User") + proto.RegisterType((*CreateOrgRequest)(nil), "zitadel.admin.api.v1.CreateOrgRequest") +} + +func init() { proto.RegisterFile("admin.proto", fileDescriptor_73a7fc70dcc2027c) } + +var fileDescriptor_73a7fc70dcc2027c = []byte{ + // 1667 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x58, 0x4f, 0x73, 0x1b, 0x49, + 0x15, 0xcf, 0xe8, 0x9f, 0x47, 0x4f, 0xfe, 0x33, 0xee, 0x78, 0x9d, 0x59, 0x39, 0xbb, 0xf6, 0x0e, + 0x9b, 0x90, 0xd5, 0x12, 0x69, 0x23, 0x96, 0x2a, 0xca, 0xd4, 0x2e, 0x25, 0x5b, 0xb3, 0x8e, 0x2a, + 0xb6, 0xe4, 0x1d, 0xc9, 0xe1, 0xcf, 0x45, 0x4c, 0x34, 0xed, 0x51, 0x93, 0xd1, 0xcc, 0xa4, 0xbb, + 0x95, 0xa0, 0xa5, 0x38, 0x90, 0x2a, 0x2e, 0x1c, 0x38, 0xc0, 0x81, 0x4f, 0xc0, 0x99, 0x13, 0x57, + 0xbe, 0x04, 0x1f, 0x80, 0x0b, 0x55, 0x5c, 0x38, 0x70, 0xe1, 0xb2, 0x27, 0xaa, 0xbb, 0x47, 0xb2, + 0x46, 0x96, 0x62, 0x52, 0x5c, 0xf6, 0x64, 0xf5, 0xef, 0xf7, 0x7b, 0xaf, 0x5f, 0xbf, 0x7e, 0xfd, + 0xa6, 0xdb, 0x50, 0x72, 0xbd, 0x11, 0x09, 0xab, 0x31, 0x8d, 0x78, 0x84, 0x76, 0xbe, 0x22, 0xdc, + 0xf5, 0x70, 0x50, 0x55, 0xa0, 0x1b, 0x93, 0xea, 0xcb, 0x47, 0xe5, 0xbb, 0x7e, 0x14, 0xf9, 0x01, + 0xae, 0xb9, 0x31, 0xa9, 0xb9, 0x61, 0x18, 0x71, 0x97, 0x93, 0x28, 0x64, 0xca, 0xa6, 0xbc, 0x97, + 0xb0, 0x72, 0xf4, 0x6c, 0x7c, 0x59, 0xc3, 0xa3, 0x98, 0x4f, 0x12, 0x72, 0x7f, 0x91, 0xe4, 0x64, + 0x84, 0x19, 0x77, 0x47, 0x71, 0x22, 0xb8, 0xbb, 0x28, 0x60, 0x9c, 0x8e, 0x07, 0x3c, 0x61, 0xef, + 0xbc, 0x74, 0x03, 0xe2, 0xb9, 0x1c, 0xd7, 0xa6, 0x3f, 0x12, 0xe2, 0x3b, 0xf2, 0xcf, 0xe0, 0xa1, + 0x8f, 0xc3, 0x87, 0xec, 0x95, 0xeb, 0xfb, 0x98, 0xd6, 0xa2, 0x58, 0x86, 0xb5, 0x24, 0x44, 0xd3, + 0x1d, 0xf3, 0xa1, 0xa2, 0xa7, 0x2a, 0xc5, 0x58, 0x77, 0x20, 0xdf, 0xa1, 0x7e, 0xab, 0x89, 0x36, + 0x21, 0x43, 0x3c, 0x53, 0x3b, 0xd0, 0x1e, 0x14, 0x9d, 0x0c, 0xf1, 0xac, 0x73, 0x30, 0x2e, 0x42, + 0xf2, 0x62, 0x8c, 0x3b, 0xd4, 0x77, 0xf0, 0x8b, 0x31, 0x66, 0x1c, 0xed, 0x41, 0x2e, 0x74, 0x47, + 0x58, 0xa9, 0x8e, 0xd6, 0xbe, 0x3e, 0xca, 0xd1, 0x8c, 0xa1, 0x39, 0x12, 0x44, 0xfb, 0x50, 0xf0, + 0xa2, 0x91, 0x4b, 0x42, 0x33, 0x93, 0xa6, 0x13, 0xd8, 0xfa, 0x04, 0xb6, 0xe7, 0x3c, 0xb2, 0x38, + 0x0a, 0x19, 0x46, 0x7b, 0x50, 0x24, 0xac, 0x3f, 0x96, 0xb8, 0xf4, 0xab, 0x3b, 0x3a, 0x61, 0x4a, + 0x67, 0xfd, 0x47, 0x83, 0x6c, 0x87, 0xfa, 0x8b, 0xb1, 0xa1, 0x4f, 0x21, 0xcf, 0xb8, 0xcb, 0xb1, + 0x9c, 0x69, 0xb3, 0xfe, 0x7e, 0x75, 0xd9, 0xae, 0x55, 0x3b, 0xd4, 0xef, 0x0a, 0x95, 0xa3, 0xc4, + 0xe8, 0x87, 0xb0, 0x31, 0xa0, 0x58, 0xe6, 0xa5, 0x2f, 0x32, 0x69, 0x66, 0x0f, 0xb4, 0x07, 0xa5, + 0x7a, 0xb9, 0xaa, 0x76, 0xa0, 0x3a, 0xdd, 0x81, 0x6a, 0x6f, 0xba, 0x45, 0xce, 0xfa, 0xd4, 0xa0, + 0x29, 0x1c, 0xfc, 0x00, 0x4a, 0x83, 0xa1, 0x1b, 0xfa, 0x58, 0x99, 0xe7, 0x6e, 0x34, 0x07, 0x25, + 0x97, 0xc6, 0x28, 0xc9, 0x5d, 0x5e, 0xae, 0x42, 0xa5, 0x6c, 0x77, 0x96, 0xb2, 0x82, 0x44, 0xa7, + 0x99, 0xfa, 0xa7, 0x06, 0x86, 0x88, 0x1e, 0xbb, 0x74, 0x30, 0x9c, 0x26, 0x7f, 0x17, 0x0a, 0xd1, + 0xe5, 0x25, 0xc3, 0x5c, 0x26, 0x22, 0xe7, 0x24, 0x23, 0xb4, 0x03, 0xf9, 0x80, 0x8c, 0x08, 0x97, + 0xc9, 0xc8, 0x39, 0x6a, 0x80, 0xba, 0xb0, 0xc9, 0x22, 0xca, 0x49, 0xe8, 0xf7, 0x07, 0x51, 0x30, + 0x1e, 0x85, 0x72, 0xb5, 0x9b, 0x75, 0x6b, 0x75, 0xae, 0xe4, 0x6c, 0x4f, 0xf0, 0xe4, 0x48, 0xff, + 0xfa, 0x28, 0xff, 0x5a, 0xcb, 0x1c, 0xdc, 0x72, 0x36, 0x12, 0x1f, 0xc7, 0xd2, 0x05, 0x32, 0x20, + 0xeb, 0xb2, 0x81, 0x5c, 0xb8, 0xee, 0x88, 0x9f, 0xe8, 0x73, 0x58, 0x7b, 0x31, 0xc6, 0x94, 0x60, + 0x66, 0xe6, 0x0f, 0xb2, 0x0f, 0x4a, 0xf5, 0x0f, 0x6f, 0xf0, 0xff, 0xe5, 0x18, 0xd3, 0x89, 0x33, + 0x35, 0xb2, 0xfe, 0xa4, 0xc1, 0x66, 0x9a, 0x43, 0x9f, 0x43, 0xf6, 0x39, 0x9e, 0xc8, 0x45, 0xbe, + 0x6d, 0xb8, 0xc2, 0x10, 0x7d, 0x06, 0x85, 0x11, 0xe6, 0xc3, 0xc8, 0x4b, 0xaa, 0xe3, 0xde, 0x0d, + 0x2e, 0xce, 0xa4, 0xd8, 0x49, 0x8c, 0x44, 0x3a, 0x5f, 0xba, 0xc1, 0x58, 0x55, 0x47, 0xd1, 0x51, + 0x03, 0xeb, 0x8f, 0x1a, 0x6c, 0xcf, 0xed, 0x48, 0x52, 0xbc, 0x6f, 0xb7, 0x25, 0x1f, 0xc0, 0x3a, + 0x8f, 0xb8, 0x1b, 0xf4, 0x29, 0x66, 0xe3, 0x80, 0xcb, 0x09, 0x72, 0x4e, 0x49, 0x62, 0x8e, 0x84, + 0xd0, 0x23, 0x28, 0x24, 0x64, 0x4e, 0x66, 0xf3, 0xdd, 0x95, 0xb1, 0x3b, 0x89, 0xd0, 0xfa, 0xad, + 0x06, 0x5b, 0x32, 0x32, 0x7e, 0x11, 0x4f, 0x4b, 0xe5, 0xfb, 0x90, 0x8d, 0xa8, 0x2f, 0x83, 0x2a, + 0xd5, 0xef, 0x2f, 0xf7, 0x71, 0x2c, 0x2a, 0x7b, 0xee, 0x70, 0x3b, 0xc2, 0x04, 0x7d, 0x06, 0xb9, + 0x31, 0xc3, 0x54, 0x06, 0x5e, 0xaa, 0x7f, 0xb4, 0xdc, 0xd4, 0xc1, 0x3e, 0x61, 0x1c, 0xd3, 0x0b, + 0x86, 0xe9, 0xd4, 0x5a, 0x9a, 0x59, 0x51, 0x52, 0xb7, 0x32, 0x96, 0x24, 0x49, 0x1f, 0xcf, 0x07, + 0xf3, 0x86, 0x05, 0xc9, 0xf9, 0xab, 0xa9, 0xf9, 0xcb, 0xcb, 0xd5, 0x72, 0x5e, 0x35, 0xe1, 0xbf, + 0x32, 0x70, 0x7b, 0x49, 0x38, 0xe8, 0x3d, 0xc8, 0xe3, 0x91, 0x4b, 0x82, 0x54, 0xab, 0xfa, 0x99, + 0xe6, 0x28, 0x14, 0xdd, 0x07, 0xb8, 0x24, 0x94, 0xf1, 0xbe, 0x3c, 0x92, 0x0b, 0xfd, 0xaa, 0x28, + 0xa9, 0xb6, 0x38, 0xa0, 0x1f, 0x42, 0x31, 0x70, 0xa7, 0xb2, 0x6c, 0x5a, 0xa6, 0x0b, 0x46, 0xaa, + 0xf6, 0xa0, 0x18, 0x92, 0xc1, 0x73, 0xa5, 0xca, 0xc9, 0xb2, 0xd1, 0x05, 0x20, 0xc9, 0x0f, 0x60, + 0xdd, 0x23, 0x2c, 0x0e, 0xdc, 0x49, 0x7f, 0xee, 0xfc, 0x97, 0x12, 0x4c, 0x4a, 0x1e, 0x02, 0x8a, + 0x29, 0xbe, 0xc4, 0x94, 0x62, 0xaf, 0x1f, 0xb8, 0xa1, 0x3f, 0x76, 0x7d, 0x9c, 0xb4, 0x84, 0xed, + 0x19, 0x73, 0x9a, 0x10, 0xe8, 0x53, 0x28, 0xf8, 0x38, 0xf4, 0x30, 0x35, 0xd7, 0x64, 0x81, 0xdf, + 0x5d, 0x9e, 0xa5, 0x13, 0xa9, 0x71, 0x12, 0x2d, 0xfa, 0x16, 0xe8, 0xb1, 0xcb, 0xd8, 0xab, 0x88, + 0x7a, 0xa6, 0xbe, 0xb0, 0x92, 0x29, 0x81, 0xde, 0x87, 0x42, 0x44, 0xfd, 0x3e, 0xf1, 0xcc, 0x62, + 0x5a, 0x92, 0x8f, 0xa8, 0xdf, 0xf2, 0xac, 0xbf, 0xe7, 0x21, 0x27, 0xd2, 0x7c, 0xad, 0x23, 0x7f, + 0x2f, 0xdd, 0x91, 0xf7, 0x57, 0x6f, 0xdc, 0x37, 0xa8, 0x25, 0xef, 0x41, 0x51, 0x14, 0xd1, 0xfc, + 0xbe, 0xe8, 0x02, 0x90, 0x9b, 0xf2, 0x5e, 0xaa, 0x44, 0xd4, 0x66, 0xcc, 0x55, 0xc6, 0xde, 0x7c, + 0x65, 0xac, 0x29, 0xdb, 0xe5, 0x05, 0xa1, 0xdf, 0x50, 0x10, 0xc5, 0xff, 0xb5, 0x20, 0xe0, 0xe6, + 0x82, 0x28, 0xbd, 0x45, 0x41, 0xec, 0x4c, 0x8f, 0xc8, 0xba, 0x6a, 0x74, 0xea, 0x64, 0x3c, 0x80, + 0x2d, 0xc2, 0x6c, 0xf1, 0xf3, 0x29, 0xa6, 0xe4, 0x92, 0x60, 0xcf, 0xdc, 0x90, 0xed, 0x7e, 0x11, + 0x16, 0xf6, 0xf1, 0x30, 0x0a, 0xb1, 0xb9, 0xa9, 0xec, 0xe5, 0x40, 0xd9, 0x9f, 0x8b, 0x9f, 0x33, + 0xfb, 0xad, 0xa9, 0x7d, 0x0a, 0x46, 0x26, 0xac, 0x0d, 0xa2, 0x71, 0xc8, 0xe9, 0xc4, 0x34, 0xa4, + 0x87, 0xe9, 0x10, 0x95, 0x41, 0x0f, 0xa2, 0x81, 0x1b, 0x10, 0x3e, 0x31, 0xb7, 0x93, 0xd4, 0x26, + 0x63, 0xb4, 0x0f, 0xa5, 0x38, 0x62, 0xa2, 0x8b, 0x0e, 0x22, 0x0f, 0x9b, 0x48, 0xd2, 0xa0, 0xa0, + 0xe3, 0xc8, 0x93, 0x3d, 0x99, 0x62, 0x9f, 0x44, 0xa1, 0x79, 0x5b, 0x7d, 0x53, 0xd5, 0x08, 0xdd, + 0x83, 0x4d, 0xc6, 0x29, 0xc6, 0xbc, 0xef, 0x7a, 0x1e, 0xc5, 0x8c, 0x99, 0x3b, 0x92, 0xdf, 0x50, + 0x68, 0x43, 0x81, 0xe2, 0xda, 0xb3, 0xd8, 0x19, 0xff, 0xbf, 0x6b, 0x4f, 0xe5, 0x1c, 0xf4, 0xe9, + 0x4d, 0x04, 0x99, 0xb0, 0xd3, 0x71, 0x4e, 0xba, 0xbd, 0x46, 0xcf, 0xee, 0x5f, 0xb4, 0xbb, 0xe7, + 0xf6, 0x71, 0xeb, 0x8b, 0x96, 0xdd, 0x34, 0x6e, 0xa1, 0xdb, 0xb0, 0x35, 0x63, 0x1a, 0xc7, 0xbd, + 0xd6, 0x53, 0xdb, 0xd0, 0xd0, 0x3b, 0xb0, 0x3d, 0x03, 0x5b, 0xed, 0x04, 0xce, 0x54, 0x7e, 0x01, + 0xeb, 0xf3, 0x1f, 0x40, 0x74, 0x17, 0x4c, 0x21, 0xb3, 0x1b, 0xce, 0xf1, 0xe3, 0x27, 0xf6, 0x4f, + 0x16, 0x3c, 0xbf, 0x0b, 0xef, 0xa4, 0xd8, 0x8e, 0x73, 0xd2, 0x6f, 0x37, 0xce, 0x84, 0xff, 0x3b, + 0x70, 0x3b, 0x45, 0x35, 0x3b, 0x67, 0x8d, 0x56, 0xdb, 0xc8, 0xa0, 0x5d, 0x40, 0x29, 0x42, 0x86, + 0x60, 0x64, 0x2b, 0x41, 0xf2, 0xad, 0xb9, 0xfa, 0x6e, 0xa2, 0x32, 0xec, 0xce, 0xa4, 0x67, 0x76, + 0xef, 0x71, 0xa7, 0xd9, 0xb7, 0xbf, 0xbc, 0x68, 0x9c, 0x76, 0x8d, 0x5b, 0x68, 0x1f, 0xf6, 0x16, + 0xb9, 0x6e, 0xaf, 0xe1, 0xf4, 0xba, 0xfd, 0x1f, 0xb5, 0x7a, 0x8f, 0x0d, 0x2d, 0x15, 0x79, 0x22, + 0x38, 0xee, 0xb4, 0x7b, 0x8d, 0x56, 0xbb, 0x6b, 0x64, 0x2a, 0x7f, 0xd6, 0xa0, 0x38, 0x6b, 0x19, + 0x62, 0x1d, 0x17, 0x5d, 0xdb, 0x59, 0x96, 0xbc, 0x1d, 0x30, 0xae, 0xa8, 0x59, 0xf6, 0x76, 0x01, + 0x5d, 0xa1, 0x57, 0xe9, 0x13, 0x59, 0xbd, 0xc2, 0x9b, 0xf6, 0xa9, 0xdd, 0xb3, 0x9b, 0x46, 0x36, + 0xed, 0xe4, 0xb4, 0x73, 0xfc, 0xc4, 0x6e, 0x1a, 0xb9, 0xb4, 0xb8, 0x7b, 0xd1, 0x3d, 0xb7, 0xdb, + 0x4d, 0x23, 0x9f, 0x86, 0x5b, 0xed, 0x56, 0xaf, 0xd5, 0x38, 0x35, 0x0a, 0x95, 0x1f, 0x43, 0x41, + 0x9d, 0x32, 0x31, 0xf9, 0x89, 0xdd, 0x6e, 0xda, 0xce, 0x42, 0xa8, 0xdb, 0xb0, 0x91, 0xe0, 0x5f, + 0xd8, 0x67, 0x8d, 0x53, 0x11, 0xe7, 0x16, 0x94, 0x12, 0x48, 0x02, 0x19, 0x84, 0x60, 0x33, 0x01, + 0x9a, 0xad, 0xa7, 0xb6, 0xd3, 0xb5, 0x8d, 0x6c, 0xfd, 0xdf, 0x79, 0x58, 0x6f, 0x88, 0xd3, 0xdc, + 0xc5, 0xf4, 0x25, 0x19, 0x60, 0xf4, 0x04, 0xd6, 0x1e, 0x63, 0x37, 0xe0, 0xc3, 0xaf, 0xd0, 0xee, + 0xb5, 0x7e, 0x67, 0x8b, 0x17, 0x48, 0x79, 0x05, 0x6e, 0x19, 0xaf, 0xff, 0xf6, 0x8f, 0x3f, 0x64, + 0x00, 0xe9, 0xb5, 0x61, 0xe2, 0xe1, 0x04, 0xf2, 0x0e, 0x76, 0xbd, 0xc9, 0x5b, 0xbb, 0xda, 0x94, + 0xae, 0x74, 0x54, 0xa8, 0x51, 0x69, 0xdf, 0x06, 0xfd, 0x69, 0xf2, 0x50, 0x59, 0xe9, 0xeb, 0xce, + 0x35, 0xbc, 0x2b, 0x9f, 0x3c, 0xd6, 0xb6, 0x74, 0x56, 0x42, 0xc5, 0xd9, 0x63, 0x07, 0xfd, 0x46, + 0x83, 0x52, 0x8b, 0x75, 0xa8, 0xaf, 0x5e, 0x04, 0x68, 0xc5, 0x65, 0x66, 0xf1, 0xa5, 0x52, 0xfe, + 0xf6, 0x8d, 0x3a, 0x75, 0x3b, 0xb1, 0xee, 0xbd, 0xfe, 0x8b, 0x09, 0xa0, 0x13, 0x77, 0x54, 0x15, + 0x2b, 0x90, 0x11, 0x6c, 0xa3, 0xad, 0x5a, 0x44, 0x7d, 0x56, 0xeb, 0x13, 0xa6, 0x5e, 0x26, 0xe8, + 0x12, 0xe0, 0x04, 0xf3, 0x0e, 0xf5, 0x8f, 0x26, 0xad, 0x26, 0xda, 0x5b, 0x79, 0x8b, 0x69, 0x35, + 0xcb, 0xab, 0xaf, 0x38, 0xd6, 0xc1, 0x92, 0xc9, 0xd6, 0x11, 0xa8, 0xc9, 0x7e, 0x49, 0xbc, 0x5f, + 0x89, 0xf5, 0x82, 0x3a, 0x5e, 0x1d, 0xea, 0xb3, 0x55, 0xcb, 0x5d, 0x7c, 0x1b, 0xac, 0x5a, 0xee, + 0xb5, 0x1b, 0xab, 0x75, 0x7f, 0x49, 0x04, 0xc8, 0xda, 0x48, 0x96, 0xcb, 0xa4, 0xf8, 0x50, 0xab, + 0xa0, 0x5f, 0x6b, 0xa0, 0xcb, 0x6b, 0x9c, 0x78, 0x7e, 0xbd, 0xe9, 0x06, 0x7d, 0x75, 0xeb, 0x2c, + 0xdf, 0xbf, 0x49, 0x36, 0x17, 0x43, 0x09, 0x8a, 0x22, 0x86, 0x57, 0x94, 0x70, 0xac, 0x72, 0x6e, + 0xad, 0xcf, 0x82, 0xe0, 0xe3, 0xf8, 0x50, 0xab, 0x1c, 0xfd, 0x55, 0xfb, 0x7d, 0xe3, 0x77, 0x1a, + 0x6a, 0xc0, 0x86, 0xf4, 0x77, 0xc0, 0x54, 0xe5, 0x5b, 0x1f, 0xa3, 0x8f, 0x86, 0x9c, 0xc7, 0xec, + 0xb0, 0x56, 0xf3, 0x09, 0x1f, 0x8e, 0x9f, 0x55, 0x07, 0xd1, 0xa8, 0x36, 0x70, 0x23, 0x56, 0x4b, + 0x02, 0xa8, 0xc5, 0xcf, 0xfd, 0x9a, 0x34, 0xaa, 0x67, 0x3f, 0xa9, 0x3e, 0xaa, 0x68, 0x99, 0xba, + 0xe1, 0xc6, 0x71, 0x40, 0x06, 0xf2, 0xe6, 0x50, 0xfb, 0x39, 0x8b, 0xc2, 0x34, 0xe2, 0xd3, 0x78, + 0x70, 0x78, 0x4d, 0x73, 0x78, 0x4d, 0xf3, 0xd3, 0xca, 0x8d, 0x53, 0xca, 0xff, 0x12, 0x08, 0xed, + 0xb3, 0x82, 0x2c, 0xf0, 0xef, 0xfe, 0x37, 0x00, 0x00, 0xff, 0xff, 0x70, 0xfd, 0x92, 0x95, 0x62, + 0x10, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AdminServiceClient is the client API for AdminService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AdminServiceClient interface { + // Healthz returns status OK as soon as the service started + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //ORG + IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) + SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) +} + +type adminServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAdminServiceClient(cc grpc.ClientConnInterface) AdminServiceClient { + return &adminServiceClient{cc} +} + +func (c *adminServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) { + out := new(UniqueOrgResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/IsOrgUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) { + out := new(OrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SearchOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) { + out := new(OrgSetUpResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SetUpOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AdminServiceServer is the server API for AdminService service. +type AdminServiceServer interface { + // Healthz returns status OK as soon as the service started + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //ORG + IsOrgUnique(context.Context, *UniqueOrgRequest) (*UniqueOrgResponse, error) + GetOrgByID(context.Context, *OrgID) (*Org, error) + SearchOrgs(context.Context, *OrgSearchRequest) (*OrgSearchResponse, error) + SetUpOrg(context.Context, *OrgSetUpRequest) (*OrgSetUpResponse, error) +} + +// UnimplementedAdminServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAdminServiceServer struct { +} + +func (*UnimplementedAdminServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAdminServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAdminServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAdminServiceServer) IsOrgUnique(ctx context.Context, req *UniqueOrgRequest) (*UniqueOrgResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsOrgUnique not implemented") +} +func (*UnimplementedAdminServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedAdminServiceServer) SearchOrgs(ctx context.Context, req *OrgSearchRequest) (*OrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgs not implemented") +} +func (*UnimplementedAdminServiceServer) SetUpOrg(ctx context.Context, req *OrgSetUpRequest) (*OrgSetUpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetUpOrg not implemented") +} + +func RegisterAdminServiceServer(s *grpc.Server, srv AdminServiceServer) { + s.RegisterService(&_AdminService_serviceDesc, srv) +} + +func _AdminService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_IsOrgUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueOrgRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).IsOrgUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/IsOrgUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).IsOrgUnique(ctx, req.(*UniqueOrgRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SearchOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SearchOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SearchOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SearchOrgs(ctx, req.(*OrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SetUpOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSetUpRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SetUpOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SetUpOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SetUpOrg(ctx, req.(*OrgSetUpRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _AdminService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.admin.api.v1.AdminService", + HandlerType: (*AdminServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AdminService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AdminService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AdminService_Validate_Handler, + }, + { + MethodName: "IsOrgUnique", + Handler: _AdminService_IsOrgUnique_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _AdminService_GetOrgByID_Handler, + }, + { + MethodName: "SearchOrgs", + Handler: _AdminService_SearchOrgs_Handler, + }, + { + MethodName: "SetUpOrg", + Handler: _AdminService_SetUpOrg_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "admin.proto", +} diff --git a/pkg/admin/api/grpc/admin.pb.gw.go b/pkg/admin/api/grpc/admin.pb.gw.go new file mode 100644 index 0000000000..d5c56470e2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.gw.go @@ -0,0 +1,348 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: admin.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AdminService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AdminService_IsOrgUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_AdminService_IsOrgUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueOrgRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AdminService_IsOrgUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsOrgUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SearchOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SetUpOrg_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSetUpRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetUpOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAdminServiceHandlerFromEndpoint is same as RegisterAdminServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAdminServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAdminServiceHandler(ctx, mux, conn) +} + +// RegisterAdminServiceHandler registers the http handlers for service AdminService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAdminServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAdminServiceHandlerClient(ctx, mux, NewAdminServiceClient(conn)) +} + +// RegisterAdminServiceHandlerClient registers the http handlers for service AdminService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AdminServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AdminServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AdminServiceClient" to call the correct interceptors. +func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AdminServiceClient) error { + + mux.Handle("GET", pattern_AdminService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_IsOrgUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_IsOrgUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_IsOrgUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SearchOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SearchOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SearchOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SetUpOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SetUpOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SetUpOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AdminService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AdminService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AdminService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AdminService_IsOrgUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_isunique"}, "")) + + pattern_AdminService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_AdminService_SearchOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_search"}, "")) + + pattern_AdminService_SetUpOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_setup"}, "")) +) + +var ( + forward_AdminService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AdminService_Ready_0 = runtime.ForwardResponseMessage + + forward_AdminService_Validate_0 = runtime.ForwardResponseMessage + + forward_AdminService_IsOrgUnique_0 = runtime.ForwardResponseMessage + + forward_AdminService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_AdminService_SearchOrgs_0 = runtime.ForwardResponseMessage + + forward_AdminService_SetUpOrg_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json new file mode 100644 index 0000000000..c312a23b6f --- /dev/null +++ b/pkg/admin/api/grpc/admin.swagger.json @@ -0,0 +1,530 @@ +{ + "swagger": "2.0", + "info": { + "title": "admin service", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/admin" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/healthz": { + "get": { + "summary": "Healthz returns status OK as soon as the service started", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_isunique": { + "get": { + "summary": "ORG", + "operationId": "IsOrgUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueOrgResponse" + } + } + }, + "parameters": [ + { + "name": "name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "domain", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_search": { + "post": { + "operationId": "SearchOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSearchRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_setup": { + "post": { + "operationId": "SetUpOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSetUpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSetUpRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/{id}": { + "get": { + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/ready": { + "get": { + "summary": "Ready returns status OK as soon as all dependent services are available", + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AdminService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1CreateOrgRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgSearchKey": { + "type": "string", + "enum": [ + "ORGSEARCHKEY_UNSPECIFIED", + "ORGSEARCHKEY_ORG_NAME", + "ORGSEARCHKEY_DOMAIN", + "ORGSEARCHKEY_STATE" + ], + "default": "ORGSEARCHKEY_UNSPECIFIED" + }, + "v1OrgSearchMethod": { + "type": "string", + "enum": [ + "ORGSEARCHMETHOD_EQUALS", + "ORGSEARCHMETHOD_STARTS_WITH", + "ORGSEARCHMETHOD_CONTAINS" + ], + "default": "ORGSEARCHMETHOD_EQUALS" + }, + "v1OrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1OrgSearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgSearchQuery" + } + } + } + }, + "v1OrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1OrgSetUpRequest": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1CreateOrgRequest" + }, + "user": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + }, + "v1OrgSetUpResponse": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1Org" + }, + "user": { + "$ref": "#/definitions/v1User" + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1UniqueOrgResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "isPhoneVerified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/admin/api/grpc/gateway.go b/pkg/admin/api/grpc/gateway.go new file mode 100644 index 0000000000..0eaa3c6ae8 --- /dev/null +++ b/pkg/admin/api/grpc/gateway.go @@ -0,0 +1,47 @@ +package grpc + +import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "strings" +) + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterAdminServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/admin/api/grpc/generate.go b/pkg/admin/api/grpc/generate.go new file mode 100644 index 0000000000..cfbffbf3b5 --- /dev/null +++ b/pkg/admin/api/grpc/generate.go @@ -0,0 +1,6 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I$GOPATH/src/github.com/envoyproxy/protoc-gen-validate -I$GOPATH/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto +//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/zitadel/pkg/admin/api/grpc AdminServiceClient + +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go new file mode 100644 index 0000000000..253d6aee69 --- /dev/null +++ b/pkg/admin/api/grpc/mock/admin.proto.mock.go @@ -0,0 +1,178 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/admin/api/grpc (interfaces: AdminServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/admin/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAdminServiceClient is a mock of AdminServiceClient interface +type MockAdminServiceClient struct { + ctrl *gomock.Controller + recorder *MockAdminServiceClientMockRecorder +} + +// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient +type MockAdminServiceClientMockRecorder struct { + mock *MockAdminServiceClient +} + +// NewMockAdminServiceClient creates a new mock instance +func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient { + mock := &MockAdminServiceClient{ctrl: ctrl} + mock.recorder = &MockAdminServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder { + return m.recorder +} + +// GetOrgByID mocks base method +func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByID", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByID indicates an expected call of GetOrgByID +func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...) +} + +// Healthz mocks base method +func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...) +} + +// IsOrgUnique mocks base method +func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsOrgUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueOrgResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsOrgUnique indicates an expected call of IsOrgUnique +func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...) +} + +// Ready mocks base method +func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...) +} + +// SearchOrgs mocks base method +func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchOrgs", varargs...) + ret0, _ := ret[0].(*grpc.OrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchOrgs indicates an expected call of SearchOrgs +func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...) +} + +// SetUpOrg mocks base method +func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetUpOrg", varargs...) + ret0, _ := ret[0].(*grpc.OrgSetUpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetUpOrg indicates an expected call of SetUpOrg +func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...) +} + +// Validate mocks base method +func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...) +} diff --git a/pkg/admin/api/grpc/org.go b/pkg/admin/api/grpc/org.go new file mode 100644 index 0000000000..8168f376a1 --- /dev/null +++ b/pkg/admin/api/grpc/org.go @@ -0,0 +1,22 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetOrgByID(ctx context.Context, orgID *OrgID) (_ *Org, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mvn3R", "Not implemented") +} + +func (s *Server) SearchOrgs(ctx context.Context, request *OrgSearchRequest) (_ *OrgSearchResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Po9Hd", "Not implemented") +} + +func (s *Server) IsOrgUnique(ctx context.Context, request *UniqueOrgRequest) (org *UniqueOrgResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0p6Fw", "Not implemented") +} + +func (s *Server) SetUpOrg(ctx context.Context, orgSetUp *OrgSetUpRequest) (_ *OrgSetUpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-hdj5D", "Not implemented") +} diff --git a/pkg/admin/api/grpc/probes.go b/pkg/admin/api/grpc/probes.go new file mode 100644 index 0000000000..46e9966bb9 --- /dev/null +++ b/pkg/admin/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bw3vR", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-98Gse", "Not implemented") +} diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go new file mode 100644 index 0000000000..895d75e7f8 --- /dev/null +++ b/pkg/admin/api/grpc/server.go @@ -0,0 +1,44 @@ +package grpc + +import ( + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" + "google.golang.org/grpc" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" +) + +var _ AdminServiceServer = (*Server)(nil) + +type Config struct { + Port string + SearchLimit int +} + +type Server struct { + port string + searchLimit int +} + +func StartServer(conf grpc_util.ServerConfig) *Server { + return &Server{ + port: conf.Port, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + middleware.ErrorHandler(), + ), + ), + ) + RegisterAdminServiceServer(gs, s) + return gs, nil +} diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto new file mode 100644 index 0000000000..89a511e792 --- /dev/null +++ b/pkg/admin/api/proto/admin.proto @@ -0,0 +1,230 @@ + +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/timestamp.proto"; +import "google/protobuf/struct.proto"; +import "validate/validate.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "authoption/options.proto"; + +package zitadel.admin.api.v1; + +option go_package ="github.com/caos/zitadel/pkg/admin/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "admin service"; + version: "0.1"; + contact:{ + url: "https://github.com/caos/zitadel/pkg/admin" + }; + }; + + schemes: HTTPS; + + consumes: "application/json"; + consumes: "application/grpc"; + + produces: "application/json"; + produces: "application/grpc"; +}; + +service AdminService { + // --------- + // Probes + // --------- + + // Healthz returns status OK as soon as the service started + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + // Ready returns status OK as soon as all dependent services are available + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + +//ORG + rpc IsOrgUnique(UniqueOrgRequest) returns (UniqueOrgResponse) { + option (google.api.http) = { + get: "/orgs/_isunique" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc GetOrgByID(OrgID) returns (Org) { + option (google.api.http) = { + get: "/orgs/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc SearchOrgs(OrgSearchRequest) returns (OrgSearchResponse) { + option (google.api.http) = { + post: "/orgs/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc SetUpOrg(OrgSetUpRequest) returns (OrgSetUpResponse) { + option (google.api.http) = { + post: "/orgs/_setup" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.write" + }; + } +} + +message OrgID { + string id = 1; +} + +message UniqueOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} + +message UniqueOrgResponse { + bool is_unique = 1; +} + +message Org { + string id = 1; + OrgState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + string domain = 6; +} + +enum OrgState { + ORGSTATE_UNSPECIFIED = 0; + ORGSTATE_ACTIVE = 1; + ORGSTATE_INACTIVE = 2; +} + +message OrgSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + OrgSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated OrgSearchQuery queries = 5; +} + +message OrgSearchQuery { + OrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + OrgSearchMethod method = 2; + string value = 3; +} + +enum OrgSearchKey { + ORGSEARCHKEY_UNSPECIFIED = 0; + ORGSEARCHKEY_ORG_NAME = 1; + ORGSEARCHKEY_DOMAIN = 2; + ORGSEARCHKEY_STATE = 3; +} + +message OrgSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Org result = 4; +} + +enum OrgSearchMethod { + ORGSEARCHMETHOD_EQUALS = 0; + ORGSEARCHMETHOD_STARTS_WITH = 1; + ORGSEARCHMETHOD_CONTAINS = 2; +} + +message OrgSetUpRequest { + CreateOrgRequest org = 1; + RegisterUserRequest user = 2; +} + +message OrgSetUpResponse { + Org org = 1; + User user = 2; +} + +message RegisterUserRequest { + string email = 1 [(validate.rules).string.email = true]; + string first_name = 2 [(validate.rules).string.min_len = 1]; + string last_name = 3 [(validate.rules).string.min_len = 1]; + string nick_name = 4; + string display_name = 5; + string preferred_language = 6; + Gender gender = 7; + string password = 8 [(validate.rules).string.min_len = 1]; + string org_id = 9 [(validate.rules).string.min_len = 1]; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string user_name = 5; + string first_name = 6; + string last_name = 7; + string nick_name = 8; + string display_name = 9; + string preferred_language = 10; + Gender gender = 11; + string email = 12; + bool isEmailVerified = 13; + string phone = 14; + bool isPhoneVerified = 15; + string country = 16; + string locality = 17; + string postal_code = 18; + string region = 19; + string street_address = 20; +} + +enum UserState { + USERSTATE_UNSPECIFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message CreateOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} diff --git a/pkg/auth/api/api.go b/pkg/auth/api/api.go new file mode 100644 index 0000000000..e59bdd1bec --- /dev/null +++ b/pkg/auth/api/api.go @@ -0,0 +1,21 @@ +package api + +import ( + "context" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/auth/api/grpc" +) + +type Config struct { + GRPC grpc_util.Config +} + +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) + + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) +} diff --git a/pkg/auth/api/config.go b/pkg/auth/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/auth/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/auth/api/grpc/auth.pb.authoptions.go b/pkg/auth/api/grpc/auth.pb.authoptions.go new file mode 100644 index 0000000000..c84b7dc329 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.authoptions.go @@ -0,0 +1,131 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" +) + +/** + * AuthService + */ + +var AuthService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.auth.api.v1.AuthService/GetMyUserSessions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyMfas": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SetMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/AddMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/IsIamAdmin": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, +} + +func AuthService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return middleware.AuthorizationInterceptor(verifier, authConf, AuthService_AuthMethods) +} diff --git a/pkg/auth/api/grpc/auth.pb.go b/pkg/auth/api/grpc/auth.pb.go new file mode 100644 index 0000000000..9742ac4500 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.go @@ -0,0 +1,4362 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// versions: +// protoc-gen-go v1.20.1 +// protoc v3.11.3 +// source: auth.proto + +package grpc + +import ( + context "context" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" + protoimpl "google.golang.org/protobuf/runtime/protoimpl" + reflect "reflect" + sync "sync" +) + +const ( + // Verify that this generated code is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) + // Verify that runtime/protoimpl is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) +) + +// This is a compile-time assertion that a sufficiently up-to-date version +// of the legacy proto package is being used. +const _ = proto.ProtoPackageIsVersion4 + +type UserSessionState int32 + +const ( + UserSessionState_USERSESSIONSTATE_UNSPECIFIED UserSessionState = 0 + UserSessionState_USERSESSIONSTATE_ACTIVE UserSessionState = 1 + UserSessionState_USERSESSIONSTATE_TERMINATED UserSessionState = 2 +) + +// Enum value maps for UserSessionState. +var ( + UserSessionState_name = map[int32]string{ + 0: "USERSESSIONSTATE_UNSPECIFIED", + 1: "USERSESSIONSTATE_ACTIVE", + 2: "USERSESSIONSTATE_TERMINATED", + } + UserSessionState_value = map[string]int32{ + "USERSESSIONSTATE_UNSPECIFIED": 0, + "USERSESSIONSTATE_ACTIVE": 1, + "USERSESSIONSTATE_TERMINATED": 2, + } +) + +func (x UserSessionState) Enum() *UserSessionState { + p := new(UserSessionState) + *p = x + return p +} + +func (x UserSessionState) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (UserSessionState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[0].Descriptor() +} + +func (UserSessionState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[0] +} + +func (x UserSessionState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use UserSessionState.Descriptor instead. +func (UserSessionState) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{0} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN_TOKEN OIDCResponseType = 2 +) + +// Enum value maps for OIDCResponseType. +var ( + OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_ID_TOKEN_TOKEN", + } + OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN": 2, + } +) + +func (x OIDCResponseType) Enum() *OIDCResponseType { + p := new(OIDCResponseType) + *p = x + return p +} + +func (x OIDCResponseType) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (OIDCResponseType) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[1].Descriptor() +} + +func (OIDCResponseType) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[1] +} + +func (x OIDCResponseType) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use OIDCResponseType.Descriptor instead. +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{1} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIEFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +// Enum value maps for UserState. +var ( + UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIEFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", + } + UserState_value = map[string]int32{ + "USERSTATE_UNSPECIEFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, + } +) + +func (x UserState) Enum() *UserState { + p := new(UserState) + *p = x + return p +} + +func (x UserState) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (UserState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[2].Descriptor() +} + +func (UserState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[2] +} + +func (x UserState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use UserState.Descriptor instead. +func (UserState) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{2} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +// Enum value maps for Gender. +var ( + Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", + } + Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, + } +) + +func (x Gender) Enum() *Gender { + p := new(Gender) + *p = x + return p +} + +func (x Gender) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (Gender) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[3].Descriptor() +} + +func (Gender) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[3] +} + +func (x Gender) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use Gender.Descriptor instead. +func (Gender) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{3} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +// Enum value maps for MfaType. +var ( + MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", + } + MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, + } +) + +func (x MfaType) Enum() *MfaType { + p := new(MfaType) + *p = x + return p +} + +func (x MfaType) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (MfaType) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[4].Descriptor() +} + +func (MfaType) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[4] +} + +func (x MfaType) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use MfaType.Descriptor instead. +func (MfaType) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{4} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +// Enum value maps for MFAState. +var ( + MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", + } + MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, + } +) + +func (x MFAState) Enum() *MFAState { + p := new(MFAState) + *p = x + return p +} + +func (x MFAState) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (MFAState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[5].Descriptor() +} + +func (MFAState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[5] +} + +func (x MFAState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use MFAState.Descriptor instead. +func (MFAState) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{5} +} + +type MyProjectOrgSearchKey int32 + +const ( + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED MyProjectOrgSearchKey = 0 + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_ORG_NAME MyProjectOrgSearchKey = 1 +) + +// Enum value maps for MyProjectOrgSearchKey. +var ( + MyProjectOrgSearchKey_name = map[int32]string{ + 0: "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + 1: "MYPROJECTORGSEARCHKEY_ORG_NAME", + } + MyProjectOrgSearchKey_value = map[string]int32{ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED": 0, + "MYPROJECTORGSEARCHKEY_ORG_NAME": 1, + } +) + +func (x MyProjectOrgSearchKey) Enum() *MyProjectOrgSearchKey { + p := new(MyProjectOrgSearchKey) + *p = x + return p +} + +func (x MyProjectOrgSearchKey) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (MyProjectOrgSearchKey) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[6].Descriptor() +} + +func (MyProjectOrgSearchKey) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[6] +} + +func (x MyProjectOrgSearchKey) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use MyProjectOrgSearchKey.Descriptor instead. +func (MyProjectOrgSearchKey) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{6} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +// Enum value maps for SearchMethod. +var ( + SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", + } + SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, + } +) + +func (x SearchMethod) Enum() *SearchMethod { + p := new(SearchMethod) + *p = x + return p +} + +func (x SearchMethod) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) +} + +func (SearchMethod) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[7].Descriptor() +} + +func (SearchMethod) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[7] +} + +func (x SearchMethod) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use SearchMethod.Descriptor instead. +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{7} +} + +type UserSessionViews struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + UserSessions []*UserSessionView `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` +} + +func (x *UserSessionViews) Reset() { + *x = UserSessionViews{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[0] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserSessionViews) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserSessionViews) ProtoMessage() {} + +func (x *UserSessionViews) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[0] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserSessionViews.ProtoReflect.Descriptor instead. +func (*UserSessionViews) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{0} +} + +func (x *UserSessionViews) GetUserSessions() []*UserSessionView { + if x != nil { + return x.UserSessions + } + return nil +} + +type UserSessionView struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + UserId string `protobuf:"bytes,4,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` +} + +func (x *UserSessionView) Reset() { + *x = UserSessionView{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[1] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserSessionView) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserSessionView) ProtoMessage() {} + +func (x *UserSessionView) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[1] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserSessionView.ProtoReflect.Descriptor instead. +func (*UserSessionView) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{1} +} + +func (x *UserSessionView) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *UserSessionView) GetAgentId() string { + if x != nil { + return x.AgentId + } + return "" +} + +func (x *UserSessionView) GetAuthState() UserSessionState { + if x != nil { + return x.AuthState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +func (x *UserSessionView) GetUserId() string { + if x != nil { + return x.UserId + } + return "" +} + +func (x *UserSessionView) GetUserName() string { + if x != nil { + return x.UserName + } + return "" +} + +type UserID struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` +} + +func (x *UserID) Reset() { + *x = UserID{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[2] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserID) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserID) ProtoMessage() {} + +func (x *UserID) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[2] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserID.ProtoReflect.Descriptor instead. +func (*UserID) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{2} +} + +func (x *UserID) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +type User struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ActivationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=activation_date,json=activationDate,proto3" json:"activation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,6,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,7,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,8,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,9,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,10,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,12,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,13,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,14,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,15,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,16,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,17,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,18,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,19,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,20,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,21,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,22,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,23,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + PasswordChangeRequired bool `protobuf:"varint,24,opt,name=password_change_required,json=passwordChangeRequired,proto3" json:"password_change_required,omitempty"` +} + +func (x *User) Reset() { + *x = User{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[3] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *User) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*User) ProtoMessage() {} + +func (x *User) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[3] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use User.ProtoReflect.Descriptor instead. +func (*User) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{3} +} + +func (x *User) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *User) GetState() UserState { + if x != nil { + return x.State + } + return UserState_USERSTATE_UNSPECIEFIED +} + +func (x *User) GetCreationDate() *timestamp.Timestamp { + if x != nil { + return x.CreationDate + } + return nil +} + +func (x *User) GetActivationDate() *timestamp.Timestamp { + if x != nil { + return x.ActivationDate + } + return nil +} + +func (x *User) GetChangeDate() *timestamp.Timestamp { + if x != nil { + return x.ChangeDate + } + return nil +} + +func (x *User) GetLastLogin() *timestamp.Timestamp { + if x != nil { + return x.LastLogin + } + return nil +} + +func (x *User) GetPasswordChanged() *timestamp.Timestamp { + if x != nil { + return x.PasswordChanged + } + return nil +} + +func (x *User) GetUserName() string { + if x != nil { + return x.UserName + } + return "" +} + +func (x *User) GetFirstName() string { + if x != nil { + return x.FirstName + } + return "" +} + +func (x *User) GetLastName() string { + if x != nil { + return x.LastName + } + return "" +} + +func (x *User) GetNickName() string { + if x != nil { + return x.NickName + } + return "" +} + +func (x *User) GetDisplayName() string { + if x != nil { + return x.DisplayName + } + return "" +} + +func (x *User) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage + } + return "" +} + +func (x *User) GetGender() Gender { + if x != nil { + return x.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (x *User) GetEmail() string { + if x != nil { + return x.Email + } + return "" +} + +func (x *User) GetIsEmailVerified() bool { + if x != nil { + return x.IsEmailVerified + } + return false +} + +func (x *User) GetPhone() string { + if x != nil { + return x.Phone + } + return "" +} + +func (x *User) GetIsPhoneVerified() bool { + if x != nil { + return x.IsPhoneVerified + } + return false +} + +func (x *User) GetCountry() string { + if x != nil { + return x.Country + } + return "" +} + +func (x *User) GetLocality() string { + if x != nil { + return x.Locality + } + return "" +} + +func (x *User) GetPostalCode() string { + if x != nil { + return x.PostalCode + } + return "" +} + +func (x *User) GetRegion() string { + if x != nil { + return x.Region + } + return "" +} + +func (x *User) GetStreetAddress() string { + if x != nil { + return x.StreetAddress + } + return "" +} + +func (x *User) GetPasswordChangeRequired() bool { + if x != nil { + return x.PasswordChangeRequired + } + return false +} + +type UserProfile struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` +} + +func (x *UserProfile) Reset() { + *x = UserProfile{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[4] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserProfile) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserProfile) ProtoMessage() {} + +func (x *UserProfile) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[4] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserProfile.ProtoReflect.Descriptor instead. +func (*UserProfile) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{4} +} + +func (x *UserProfile) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *UserProfile) GetUserName() string { + if x != nil { + return x.UserName + } + return "" +} + +func (x *UserProfile) GetFirstName() string { + if x != nil { + return x.FirstName + } + return "" +} + +func (x *UserProfile) GetLastName() string { + if x != nil { + return x.LastName + } + return "" +} + +func (x *UserProfile) GetNickName() string { + if x != nil { + return x.NickName + } + return "" +} + +func (x *UserProfile) GetDisplayName() string { + if x != nil { + return x.DisplayName + } + return "" +} + +func (x *UserProfile) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage + } + return "" +} + +func (x *UserProfile) GetGender() Gender { + if x != nil { + return x.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UpdateUserProfileRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + FirstName string `protobuf:"bytes,1,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,2,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,3,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,4,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,5,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,6,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` +} + +func (x *UpdateUserProfileRequest) Reset() { + *x = UpdateUserProfileRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[5] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserProfileRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserProfileRequest) ProtoMessage() {} + +func (x *UpdateUserProfileRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[5] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserProfileRequest.ProtoReflect.Descriptor instead. +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{5} +} + +func (x *UpdateUserProfileRequest) GetFirstName() string { + if x != nil { + return x.FirstName + } + return "" +} + +func (x *UpdateUserProfileRequest) GetLastName() string { + if x != nil { + return x.LastName + } + return "" +} + +func (x *UpdateUserProfileRequest) GetNickName() string { + if x != nil { + return x.NickName + } + return "" +} + +func (x *UpdateUserProfileRequest) GetDisplayName() string { + if x != nil { + return x.DisplayName + } + return "" +} + +func (x *UpdateUserProfileRequest) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage + } + return "" +} + +func (x *UpdateUserProfileRequest) GetGender() Gender { + if x != nil { + return x.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` +} + +func (x *UserEmail) Reset() { + *x = UserEmail{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[6] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserEmail) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserEmail) ProtoMessage() {} + +func (x *UserEmail) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[6] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserEmail.ProtoReflect.Descriptor instead. +func (*UserEmail) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{6} +} + +func (x *UserEmail) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *UserEmail) GetEmail() string { + if x != nil { + return x.Email + } + return "" +} + +func (x *UserEmail) GetIsEmailVerified() bool { + if x != nil { + return x.IsEmailVerified + } + return false +} + +type VerifyMyUserEmailRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` +} + +func (x *VerifyMyUserEmailRequest) Reset() { + *x = VerifyMyUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[7] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyMyUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyMyUserEmailRequest) ProtoMessage() {} + +func (x *VerifyMyUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[7] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyMyUserEmailRequest.ProtoReflect.Descriptor instead. +func (*VerifyMyUserEmailRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{7} +} + +func (x *VerifyMyUserEmailRequest) GetCode() string { + if x != nil { + return x.Code + } + return "" +} + +type VerifyUserEmailRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` +} + +func (x *VerifyUserEmailRequest) Reset() { + *x = VerifyUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[8] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyUserEmailRequest) ProtoMessage() {} + +func (x *VerifyUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[8] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyUserEmailRequest.ProtoReflect.Descriptor instead. +func (*VerifyUserEmailRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{8} +} + +func (x *VerifyUserEmailRequest) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *VerifyUserEmailRequest) GetCode() string { + if x != nil { + return x.Code + } + return "" +} + +type UpdateUserEmailRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` +} + +func (x *UpdateUserEmailRequest) Reset() { + *x = UpdateUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[9] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserEmailRequest) ProtoMessage() {} + +func (x *UpdateUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[9] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserEmailRequest.ProtoReflect.Descriptor instead. +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{9} +} + +func (x *UpdateUserEmailRequest) GetEmail() string { + if x != nil { + return x.Email + } + return "" +} + +type UserPhone struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` +} + +func (x *UserPhone) Reset() { + *x = UserPhone{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[10] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserPhone) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserPhone) ProtoMessage() {} + +func (x *UserPhone) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[10] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserPhone.ProtoReflect.Descriptor instead. +func (*UserPhone) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{10} +} + +func (x *UserPhone) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *UserPhone) GetPhone() string { + if x != nil { + return x.Phone + } + return "" +} + +func (x *UserPhone) GetIsPhoneVerified() bool { + if x != nil { + return x.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Phone string `protobuf:"bytes,1,opt,name=phone,proto3" json:"phone,omitempty"` +} + +func (x *UpdateUserPhoneRequest) Reset() { + *x = UpdateUserPhoneRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[11] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserPhoneRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserPhoneRequest) ProtoMessage() {} + +func (x *UpdateUserPhoneRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[11] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserPhoneRequest.ProtoReflect.Descriptor instead. +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{11} +} + +func (x *UpdateUserPhoneRequest) GetPhone() string { + if x != nil { + return x.Phone + } + return "" +} + +type VerifyUserPhoneRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` +} + +func (x *VerifyUserPhoneRequest) Reset() { + *x = VerifyUserPhoneRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[12] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyUserPhoneRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyUserPhoneRequest) ProtoMessage() {} + +func (x *VerifyUserPhoneRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[12] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyUserPhoneRequest.ProtoReflect.Descriptor instead. +func (*VerifyUserPhoneRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{12} +} + +func (x *VerifyUserPhoneRequest) GetCode() string { + if x != nil { + return x.Code + } + return "" +} + +type UserAddress struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` +} + +func (x *UserAddress) Reset() { + *x = UserAddress{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[13] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserAddress) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserAddress) ProtoMessage() {} + +func (x *UserAddress) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[13] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserAddress.ProtoReflect.Descriptor instead. +func (*UserAddress) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{13} +} + +func (x *UserAddress) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *UserAddress) GetCountry() string { + if x != nil { + return x.Country + } + return "" +} + +func (x *UserAddress) GetLocality() string { + if x != nil { + return x.Locality + } + return "" +} + +func (x *UserAddress) GetPostalCode() string { + if x != nil { + return x.PostalCode + } + return "" +} + +func (x *UserAddress) GetRegion() string { + if x != nil { + return x.Region + } + return "" +} + +func (x *UserAddress) GetStreetAddress() string { + if x != nil { + return x.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Country string `protobuf:"bytes,1,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,2,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,3,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,4,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,5,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` +} + +func (x *UpdateUserAddressRequest) Reset() { + *x = UpdateUserAddressRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[14] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserAddressRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserAddressRequest) ProtoMessage() {} + +func (x *UpdateUserAddressRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[14] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserAddressRequest.ProtoReflect.Descriptor instead. +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{14} +} + +func (x *UpdateUserAddressRequest) GetCountry() string { + if x != nil { + return x.Country + } + return "" +} + +func (x *UpdateUserAddressRequest) GetLocality() string { + if x != nil { + return x.Locality + } + return "" +} + +func (x *UpdateUserAddressRequest) GetPostalCode() string { + if x != nil { + return x.PostalCode + } + return "" +} + +func (x *UpdateUserAddressRequest) GetRegion() string { + if x != nil { + return x.Region + } + return "" +} + +func (x *UpdateUserAddressRequest) GetStreetAddress() string { + if x != nil { + return x.StreetAddress + } + return "" +} + +type PasswordID struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` +} + +func (x *PasswordID) Reset() { + *x = PasswordID{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[15] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordID) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordID) ProtoMessage() {} + +func (x *PasswordID) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[15] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordID.ProtoReflect.Descriptor instead. +func (*PasswordID) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{15} +} + +func (x *PasswordID) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +type PasswordRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Password string `protobuf:"bytes,1,opt,name=password,proto3" json:"password,omitempty"` +} + +func (x *PasswordRequest) Reset() { + *x = PasswordRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[16] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordRequest) ProtoMessage() {} + +func (x *PasswordRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[16] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordRequest.ProtoReflect.Descriptor instead. +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{16} +} + +func (x *PasswordRequest) GetPassword() string { + if x != nil { + return x.Password + } + return "" +} + +type PasswordChange struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + OldPassword string `protobuf:"bytes,1,opt,name=old_password,json=oldPassword,proto3" json:"old_password,omitempty"` + NewPassword string `protobuf:"bytes,2,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` +} + +func (x *PasswordChange) Reset() { + *x = PasswordChange{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[17] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordChange) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordChange) ProtoMessage() {} + +func (x *PasswordChange) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[17] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordChange.ProtoReflect.Descriptor instead. +func (*PasswordChange) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{17} +} + +func (x *PasswordChange) GetOldPassword() string { + if x != nil { + return x.OldPassword + } + return "" +} + +func (x *PasswordChange) GetNewPassword() string { + if x != nil { + return x.NewPassword + } + return "" +} + +type VerifyMfaOtp struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` +} + +func (x *VerifyMfaOtp) Reset() { + *x = VerifyMfaOtp{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[18] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyMfaOtp) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyMfaOtp) ProtoMessage() {} + +func (x *VerifyMfaOtp) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[18] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyMfaOtp.ProtoReflect.Descriptor instead. +func (*VerifyMfaOtp) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{18} +} + +func (x *VerifyMfaOtp) GetCode() string { + if x != nil { + return x.Code + } + return "" +} + +type MultiFactors struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` +} + +func (x *MultiFactors) Reset() { + *x = MultiFactors{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[19] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MultiFactors) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MultiFactors) ProtoMessage() {} + +func (x *MultiFactors) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[19] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MultiFactors.ProtoReflect.Descriptor instead. +func (*MultiFactors) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{19} +} + +func (x *MultiFactors) GetMfas() []*MultiFactor { + if x != nil { + return x.Mfas + } + return nil +} + +type MultiFactor struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` +} + +func (x *MultiFactor) Reset() { + *x = MultiFactor{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[20] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MultiFactor) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MultiFactor) ProtoMessage() {} + +func (x *MultiFactor) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[20] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MultiFactor.ProtoReflect.Descriptor instead. +func (*MultiFactor) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{20} +} + +func (x *MultiFactor) GetType() MfaType { + if x != nil { + return x.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (x *MultiFactor) GetState() MFAState { + if x != nil { + return x.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type MfaOtpResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"` + Secret string `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` + State MFAState `protobuf:"varint,4,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` +} + +func (x *MfaOtpResponse) Reset() { + *x = MfaOtpResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[21] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MfaOtpResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MfaOtpResponse) ProtoMessage() {} + +func (x *MfaOtpResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[21] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MfaOtpResponse.ProtoReflect.Descriptor instead. +func (*MfaOtpResponse) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{21} +} + +func (x *MfaOtpResponse) GetUserId() string { + if x != nil { + return x.UserId + } + return "" +} + +func (x *MfaOtpResponse) GetUrl() string { + if x != nil { + return x.Url + } + return "" +} + +func (x *MfaOtpResponse) GetSecret() string { + if x != nil { + return x.Secret + } + return "" +} + +func (x *MfaOtpResponse) GetState() MFAState { + if x != nil { + return x.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type OIDCClientAuth struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + ClientId string `protobuf:"bytes,1,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,2,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` +} + +func (x *OIDCClientAuth) Reset() { + *x = OIDCClientAuth{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[22] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *OIDCClientAuth) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*OIDCClientAuth) ProtoMessage() {} + +func (x *OIDCClientAuth) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[22] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use OIDCClientAuth.ProtoReflect.Descriptor instead. +func (*OIDCClientAuth) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{22} +} + +func (x *OIDCClientAuth) GetClientId() string { + if x != nil { + return x.ClientId + } + return "" +} + +func (x *OIDCClientAuth) GetClientSecret() string { + if x != nil { + return x.ClientSecret + } + return "" +} + +type MyProjectOrgSearchRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*MyProjectOrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` +} + +func (x *MyProjectOrgSearchRequest) Reset() { + *x = MyProjectOrgSearchRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[23] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchRequest) ProtoMessage() {} + +func (x *MyProjectOrgSearchRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[23] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchRequest.ProtoReflect.Descriptor instead. +func (*MyProjectOrgSearchRequest) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{23} +} + +func (x *MyProjectOrgSearchRequest) GetOffset() uint64 { + if x != nil { + return x.Offset + } + return 0 +} + +func (x *MyProjectOrgSearchRequest) GetLimit() uint64 { + if x != nil { + return x.Limit + } + return 0 +} + +func (x *MyProjectOrgSearchRequest) GetAsc() bool { + if x != nil { + return x.Asc + } + return false +} + +func (x *MyProjectOrgSearchRequest) GetQueries() []*MyProjectOrgSearchQuery { + if x != nil { + return x.Queries + } + return nil +} + +type MyProjectOrgSearchQuery struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Key MyProjectOrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.MyProjectOrgSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` +} + +func (x *MyProjectOrgSearchQuery) Reset() { + *x = MyProjectOrgSearchQuery{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[24] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchQuery) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchQuery) ProtoMessage() {} + +func (x *MyProjectOrgSearchQuery) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[24] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchQuery.ProtoReflect.Descriptor instead. +func (*MyProjectOrgSearchQuery) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{24} +} + +func (x *MyProjectOrgSearchQuery) GetKey() MyProjectOrgSearchKey { + if x != nil { + return x.Key + } + return MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED +} + +func (x *MyProjectOrgSearchQuery) GetMethod() SearchMethod { + if x != nil { + return x.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (x *MyProjectOrgSearchQuery) GetValue() string { + if x != nil { + return x.Value + } + return "" +} + +type MyProjectOrgSearchResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` +} + +func (x *MyProjectOrgSearchResponse) Reset() { + *x = MyProjectOrgSearchResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[25] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchResponse) ProtoMessage() {} + +func (x *MyProjectOrgSearchResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[25] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchResponse.ProtoReflect.Descriptor instead. +func (*MyProjectOrgSearchResponse) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{25} +} + +func (x *MyProjectOrgSearchResponse) GetOffset() uint64 { + if x != nil { + return x.Offset + } + return 0 +} + +func (x *MyProjectOrgSearchResponse) GetLimit() uint64 { + if x != nil { + return x.Limit + } + return 0 +} + +func (x *MyProjectOrgSearchResponse) GetTotalResult() uint64 { + if x != nil { + return x.TotalResult + } + return 0 +} + +func (x *MyProjectOrgSearchResponse) GetResult() []*Org { + if x != nil { + return x.Result + } + return nil +} + +type IsAdminResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + IsAdmin bool `protobuf:"varint,1,opt,name=is_admin,json=isAdmin,proto3" json:"is_admin,omitempty"` +} + +func (x *IsAdminResponse) Reset() { + *x = IsAdminResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[26] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *IsAdminResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*IsAdminResponse) ProtoMessage() {} + +func (x *IsAdminResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[26] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use IsAdminResponse.ProtoReflect.Descriptor instead. +func (*IsAdminResponse) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{26} +} + +func (x *IsAdminResponse) GetIsAdmin() bool { + if x != nil { + return x.IsAdmin + } + return false +} + +type Org struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` +} + +func (x *Org) Reset() { + *x = Org{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[27] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *Org) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*Org) ProtoMessage() {} + +func (x *Org) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[27] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use Org.ProtoReflect.Descriptor instead. +func (*Org) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{27} +} + +func (x *Org) GetId() string { + if x != nil { + return x.Id + } + return "" +} + +func (x *Org) GetName() string { + if x != nil { + return x.Name + } + return "" +} + +type MyPermissions struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Permissions []string `protobuf:"bytes,1,rep,name=permissions,proto3" json:"permissions,omitempty"` +} + +func (x *MyPermissions) Reset() { + *x = MyPermissions{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[28] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyPermissions) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyPermissions) ProtoMessage() {} + +func (x *MyPermissions) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[28] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyPermissions.ProtoReflect.Descriptor instead. +func (*MyPermissions) Descriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{28} +} + +func (x *MyPermissions) GetPermissions() []string { + if x != nil { + return x.Permissions + } + return nil +} + +var File_auth_proto protoreflect.FileDescriptor + +var file_auth_proto_rawDesc = []byte{ + 0x0a, 0x0a, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x13, 0x7a, 0x69, + 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, + 0x31, 0x1a, 0x1c, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x61, 0x6e, + 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, + 0x1b, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, + 0x2f, 0x65, 0x6d, 0x70, 0x74, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1c, 0x67, 0x6f, + 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x73, 0x74, + 0x72, 0x75, 0x63, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x74, 0x69, 0x6d, 0x65, + 0x73, 0x74, 0x61, 0x6d, 0x70, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x17, 0x76, 0x61, 0x6c, + 0x69, 0x64, 0x61, 0x74, 0x65, 0x2f, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2e, 0x70, + 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x2c, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x2d, 0x67, 0x65, 0x6e, + 0x2d, 0x73, 0x77, 0x61, 0x67, 0x67, 0x65, 0x72, 0x2f, 0x6f, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x73, + 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, + 0x74, 0x6f, 0x1a, 0x18, 0x61, 0x75, 0x74, 0x68, 0x6f, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6f, + 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0x5d, 0x0a, 0x10, + 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x73, + 0x12, 0x49, 0x0a, 0x0d, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x73, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, + 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, + 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x52, 0x0c, 0x75, + 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x22, 0xb8, 0x01, 0x0a, 0x0f, + 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x12, + 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, + 0x19, 0x0a, 0x08, 0x61, 0x67, 0x65, 0x6e, 0x74, 0x5f, 0x69, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x07, 0x61, 0x67, 0x65, 0x6e, 0x74, 0x49, 0x64, 0x12, 0x44, 0x0a, 0x0a, 0x61, 0x75, + 0x74, 0x68, 0x5f, 0x73, 0x74, 0x61, 0x74, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x25, + 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, + 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, + 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x09, 0x61, 0x75, 0x74, 0x68, 0x53, 0x74, 0x61, 0x74, 0x65, + 0x12, 0x17, 0x0a, 0x07, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18, 0x04, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x06, 0x75, 0x73, 0x65, 0x72, 0x49, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, + 0x72, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, + 0x65, 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x22, 0x18, 0x0a, 0x06, 0x55, 0x73, 0x65, 0x72, 0x49, 0x44, + 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, + 0x22, 0xe2, 0x07, 0x0a, 0x04, 0x55, 0x73, 0x65, 0x72, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, + 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x34, 0x0a, 0x05, 0x73, 0x74, 0x61, + 0x74, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x73, 0x65, 0x72, 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x12, + 0x3f, 0x0a, 0x0d, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x61, 0x74, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, + 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, + 0x6d, 0x70, 0x52, 0x0c, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x61, 0x74, 0x65, + 0x12, 0x43, 0x0a, 0x0f, 0x61, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, + 0x61, 0x74, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, + 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0e, 0x61, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, + 0x6e, 0x44, 0x61, 0x74, 0x65, 0x12, 0x3b, 0x0a, 0x0b, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x5f, + 0x64, 0x61, 0x74, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, + 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0a, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x44, 0x61, + 0x74, 0x65, 0x12, 0x39, 0x0a, 0x0a, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6c, 0x6f, 0x67, 0x69, 0x6e, + 0x18, 0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, + 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, + 0x6d, 0x70, 0x52, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x4c, 0x6f, 0x67, 0x69, 0x6e, 0x12, 0x45, 0x0a, + 0x10, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, + 0x64, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, + 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, + 0x61, 0x6d, 0x70, 0x52, 0x0f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6e, 0x61, 0x6d, + 0x65, 0x18, 0x08, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, 0x65, 0x72, 0x4e, 0x61, 0x6d, + 0x65, 0x12, 0x1d, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, + 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, + 0x12, 0x1b, 0x0a, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0a, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x1b, 0x0a, + 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x21, 0x0a, 0x0c, 0x64, 0x69, + 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0c, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0b, 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, 0x0a, + 0x12, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, 0x75, + 0x61, 0x67, 0x65, 0x18, 0x0d, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, 0x65, + 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, 0x06, + 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x18, 0x0e, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, 0x7a, + 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, + 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, + 0x72, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x18, 0x0f, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2a, 0x0a, 0x11, 0x69, 0x73, 0x5f, 0x65, 0x6d, + 0x61, 0x69, 0x6c, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x18, 0x10, 0x20, 0x01, + 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, + 0x69, 0x65, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x18, 0x11, 0x20, 0x01, + 0x28, 0x09, 0x52, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2a, 0x0a, 0x11, 0x69, 0x73, 0x5f, + 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x18, 0x12, + 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x56, 0x65, 0x72, + 0x69, 0x66, 0x69, 0x65, 0x64, 0x12, 0x18, 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, + 0x18, 0x13, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, + 0x1a, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x18, 0x14, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x12, 0x1f, 0x0a, 0x0b, 0x70, + 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x15, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x0a, 0x06, + 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x18, 0x16, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x72, 0x65, + 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x25, 0x0a, 0x0e, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x5f, 0x61, + 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, 0x17, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x73, 0x74, + 0x72, 0x65, 0x65, 0x74, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x12, 0x38, 0x0a, 0x18, 0x70, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x5f, 0x72, + 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x64, 0x18, 0x18, 0x20, 0x01, 0x28, 0x08, 0x52, 0x16, 0x70, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x71, + 0x75, 0x69, 0x72, 0x65, 0x64, 0x22, 0x9a, 0x02, 0x0a, 0x0b, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, + 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6e, 0x61, + 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, 0x65, 0x72, 0x4e, 0x61, + 0x6d, 0x65, 0x12, 0x1d, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, + 0x65, 0x12, 0x1b, 0x0a, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x04, + 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x1b, + 0x0a, 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x21, 0x0a, 0x0c, 0x64, + 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x06, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x0b, 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, + 0x0a, 0x12, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, + 0x75, 0x61, 0x67, 0x65, 0x18, 0x07, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, + 0x65, 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, + 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, + 0x65, 0x72, 0x22, 0xb6, 0x02, 0x0a, 0x18, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, + 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, + 0x29, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, + 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x27, 0x0a, 0x09, 0x6c, 0x61, + 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, + 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, + 0x61, 0x6d, 0x65, 0x12, 0x27, 0x0a, 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, + 0xc8, 0x01, 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, 0x0a, 0x0c, + 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x04, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x0b, + 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x39, 0x0a, 0x12, 0x70, + 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, + 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, + 0x18, 0xc8, 0x01, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, + 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, + 0x18, 0x06, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, + 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x22, 0x5b, 0x0a, 0x09, 0x55, + 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, + 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, + 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x28, + 0x0a, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, + 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, + 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x22, 0x3a, 0x0a, 0x18, 0x56, 0x65, 0x72, 0x69, + 0x66, 0x79, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, 0x71, + 0x75, 0x65, 0x73, 0x74, 0x12, 0x1e, 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, + 0x63, 0x6f, 0x64, 0x65, 0x22, 0x48, 0x0a, 0x16, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x0e, + 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x1e, + 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, + 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x22, 0x3a, + 0x0a, 0x16, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, + 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x20, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, + 0x6c, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, + 0x18, 0xc8, 0x01, 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x5d, 0x0a, 0x09, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, + 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2a, 0x0a, + 0x11, 0x69, 0x73, 0x5f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x65, 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x50, 0x68, 0x6f, 0x6e, + 0x65, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x22, 0x39, 0x0a, 0x16, 0x55, 0x70, 0x64, + 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, + 0x65, 0x73, 0x74, 0x12, 0x1f, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, 0x10, 0x01, 0x18, 0x14, 0x52, 0x05, 0x70, + 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x38, 0x0a, 0x16, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x1e, + 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, + 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x22, 0xb3, + 0x01, 0x0a, 0x0b, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x12, 0x0e, + 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x18, + 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, + 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x1a, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, + 0x6c, 0x69, 0x74, 0x79, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, + 0x6c, 0x69, 0x74, 0x79, 0x12, 0x1f, 0x0a, 0x0b, 0x70, 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, + 0x6f, 0x64, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, 0x61, + 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x18, + 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x25, 0x0a, + 0x0e, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x5f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, + 0x06, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x41, 0x64, 0x64, + 0x72, 0x65, 0x73, 0x73, 0x22, 0xe2, 0x01, 0x0a, 0x18, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, + 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, + 0x74, 0x12, 0x22, 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x07, 0x63, 0x6f, + 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x24, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, + 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, + 0x01, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x12, 0x29, 0x0a, 0x0b, 0x70, + 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, + 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, + 0x61, 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x20, 0x0a, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, + 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, + 0x52, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x2f, 0x0a, 0x0e, 0x73, 0x74, 0x72, 0x65, + 0x65, 0x74, 0x5f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, + 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x0d, 0x73, 0x74, 0x72, 0x65, + 0x65, 0x74, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x22, 0x1c, 0x0a, 0x0a, 0x50, 0x61, 0x73, + 0x73, 0x77, 0x6f, 0x72, 0x64, 0x49, 0x44, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x22, 0x38, 0x0a, 0x0f, 0x50, 0x61, 0x73, 0x73, 0x77, + 0x6f, 0x72, 0x64, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x25, 0x0a, 0x08, 0x70, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, + 0x06, 0x72, 0x04, 0x10, 0x01, 0x18, 0x48, 0x52, 0x08, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x22, 0x6c, 0x0a, 0x0e, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x12, 0x2c, 0x0a, 0x0c, 0x6f, 0x6c, 0x64, 0x5f, 0x70, 0x61, 0x73, 0x73, 0x77, + 0x6f, 0x72, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, + 0x10, 0x01, 0x18, 0x48, 0x52, 0x0b, 0x6f, 0x6c, 0x64, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x12, 0x2c, 0x0a, 0x0c, 0x6e, 0x65, 0x77, 0x5f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, 0x10, 0x01, + 0x18, 0x48, 0x52, 0x0b, 0x6e, 0x65, 0x77, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x22, + 0x22, 0x0a, 0x0c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x12, + 0x12, 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x63, + 0x6f, 0x64, 0x65, 0x22, 0x44, 0x0a, 0x0c, 0x4d, 0x75, 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, + 0x6f, 0x72, 0x73, 0x12, 0x34, 0x0a, 0x04, 0x6d, 0x66, 0x61, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, + 0x0b, 0x32, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, + 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x75, 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, + 0x74, 0x6f, 0x72, 0x52, 0x04, 0x6d, 0x66, 0x61, 0x73, 0x22, 0x74, 0x0a, 0x0b, 0x4d, 0x75, 0x6c, + 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, 0x6f, 0x72, 0x12, 0x30, 0x0a, 0x04, 0x74, 0x79, 0x70, 0x65, + 0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1c, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x66, 0x61, + 0x54, 0x79, 0x70, 0x65, 0x52, 0x04, 0x74, 0x79, 0x70, 0x65, 0x12, 0x33, 0x0a, 0x05, 0x73, 0x74, + 0x61, 0x74, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1d, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x4d, 0x46, 0x41, 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x22, + 0x88, 0x01, 0x0a, 0x0e, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, + 0x73, 0x65, 0x12, 0x17, 0x0a, 0x07, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x06, 0x75, 0x73, 0x65, 0x72, 0x49, 0x64, 0x12, 0x10, 0x0a, 0x03, 0x75, + 0x72, 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x6c, 0x12, 0x16, 0x0a, + 0x06, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x73, + 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x33, 0x0a, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x18, 0x04, + 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1d, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x46, 0x41, 0x53, 0x74, + 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x22, 0x52, 0x0a, 0x0e, 0x4f, 0x49, + 0x44, 0x43, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x41, 0x75, 0x74, 0x68, 0x12, 0x1b, 0x0a, 0x09, + 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x5f, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, + 0x08, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x49, 0x64, 0x12, 0x23, 0x0a, 0x0d, 0x63, 0x6c, 0x69, + 0x65, 0x6e, 0x74, 0x5f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0c, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x22, 0xa3, + 0x01, 0x0a, 0x19, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, + 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x16, 0x0a, 0x06, + 0x6f, 0x66, 0x66, 0x73, 0x65, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x6f, 0x66, + 0x66, 0x73, 0x65, 0x74, 0x12, 0x14, 0x0a, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x18, 0x02, 0x20, + 0x01, 0x28, 0x04, 0x52, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x12, 0x10, 0x0a, 0x03, 0x61, 0x73, + 0x63, 0x18, 0x04, 0x20, 0x01, 0x28, 0x08, 0x52, 0x03, 0x61, 0x73, 0x63, 0x12, 0x46, 0x0a, 0x07, + 0x71, 0x75, 0x65, 0x72, 0x69, 0x65, 0x73, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x2c, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, + 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x51, 0x75, 0x65, 0x72, 0x79, 0x52, 0x07, 0x71, 0x75, 0x65, + 0x72, 0x69, 0x65, 0x73, 0x22, 0xb2, 0x01, 0x0a, 0x17, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, + 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x51, 0x75, 0x65, 0x72, 0x79, + 0x12, 0x46, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x2a, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, + 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4b, 0x65, 0x79, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x82, 0x01, + 0x02, 0x20, 0x00, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x39, 0x0a, 0x06, 0x6d, 0x65, 0x74, 0x68, + 0x6f, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x53, + 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x52, 0x06, 0x6d, 0x65, 0x74, + 0x68, 0x6f, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x03, 0x20, 0x01, + 0x28, 0x09, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x22, 0x9f, 0x01, 0x0a, 0x1a, 0x4d, 0x79, + 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, + 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x6f, 0x66, 0x66, 0x73, + 0x65, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x6f, 0x66, 0x66, 0x73, 0x65, 0x74, + 0x12, 0x14, 0x0a, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x04, 0x52, + 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x12, 0x21, 0x0a, 0x0c, 0x74, 0x6f, 0x74, 0x61, 0x6c, 0x5f, + 0x72, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x04, 0x52, 0x0b, 0x74, 0x6f, + 0x74, 0x61, 0x6c, 0x52, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x12, 0x30, 0x0a, 0x06, 0x72, 0x65, 0x73, + 0x75, 0x6c, 0x74, 0x18, 0x04, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x18, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x4f, 0x72, 0x67, 0x52, 0x06, 0x72, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x22, 0x2c, 0x0a, 0x0f, 0x49, + 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x19, + 0x0a, 0x08, 0x69, 0x73, 0x5f, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, + 0x52, 0x07, 0x69, 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x22, 0x29, 0x0a, 0x03, 0x4f, 0x72, 0x67, + 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, + 0x12, 0x12, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, + 0x6e, 0x61, 0x6d, 0x65, 0x22, 0x31, 0x0a, 0x0d, 0x4d, 0x79, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, + 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x20, 0x0a, 0x0b, 0x70, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, + 0x69, 0x6f, 0x6e, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0b, 0x70, 0x65, 0x72, 0x6d, + 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2a, 0x72, 0x0a, 0x10, 0x55, 0x73, 0x65, 0x72, 0x53, + 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x20, 0x0a, 0x1c, 0x55, + 0x53, 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, + 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x1b, 0x0a, + 0x17, 0x55, 0x53, 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, + 0x45, 0x5f, 0x41, 0x43, 0x54, 0x49, 0x56, 0x45, 0x10, 0x01, 0x12, 0x1f, 0x0a, 0x1b, 0x55, 0x53, + 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x54, + 0x45, 0x52, 0x4d, 0x49, 0x4e, 0x41, 0x54, 0x45, 0x44, 0x10, 0x02, 0x2a, 0x71, 0x0a, 0x10, 0x4f, + 0x49, 0x44, 0x43, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65, 0x12, + 0x19, 0x0a, 0x15, 0x4f, 0x49, 0x44, 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, + 0x59, 0x50, 0x45, 0x5f, 0x43, 0x4f, 0x44, 0x45, 0x10, 0x00, 0x12, 0x1d, 0x0a, 0x19, 0x4f, 0x49, + 0x44, 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x49, + 0x44, 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x10, 0x01, 0x12, 0x23, 0x0a, 0x1f, 0x4f, 0x49, 0x44, + 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x49, 0x44, + 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x10, 0x02, 0x2a, 0xb0, + 0x01, 0x0a, 0x09, 0x55, 0x73, 0x65, 0x72, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x1a, 0x0a, 0x16, + 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, + 0x49, 0x45, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x14, 0x0a, 0x10, 0x55, 0x53, 0x45, 0x52, + 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x41, 0x43, 0x54, 0x49, 0x56, 0x45, 0x10, 0x01, 0x12, 0x16, + 0x0a, 0x12, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x49, 0x4e, 0x41, 0x43, + 0x54, 0x49, 0x56, 0x45, 0x10, 0x02, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, + 0x41, 0x54, 0x45, 0x5f, 0x44, 0x45, 0x4c, 0x45, 0x54, 0x45, 0x44, 0x10, 0x03, 0x12, 0x14, 0x0a, + 0x10, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x4c, 0x4f, 0x43, 0x4b, 0x45, + 0x44, 0x10, 0x04, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, + 0x5f, 0x53, 0x55, 0x53, 0x50, 0x45, 0x4e, 0x44, 0x10, 0x05, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, + 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x49, 0x4e, 0x49, 0x54, 0x49, 0x41, 0x4c, 0x10, + 0x06, 0x2a, 0x58, 0x0a, 0x06, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x12, 0x16, 0x0a, 0x12, 0x47, + 0x45, 0x4e, 0x44, 0x45, 0x52, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, + 0x44, 0x10, 0x00, 0x12, 0x11, 0x0a, 0x0d, 0x47, 0x45, 0x4e, 0x44, 0x45, 0x52, 0x5f, 0x46, 0x45, + 0x4d, 0x41, 0x4c, 0x45, 0x10, 0x01, 0x12, 0x0f, 0x0a, 0x0b, 0x47, 0x45, 0x4e, 0x44, 0x45, 0x52, + 0x5f, 0x4d, 0x41, 0x4c, 0x45, 0x10, 0x02, 0x12, 0x12, 0x0a, 0x0e, 0x47, 0x45, 0x4e, 0x44, 0x45, + 0x52, 0x5f, 0x44, 0x49, 0x56, 0x45, 0x52, 0x53, 0x45, 0x10, 0x03, 0x2a, 0x44, 0x0a, 0x07, 0x4d, + 0x66, 0x61, 0x54, 0x79, 0x70, 0x65, 0x12, 0x17, 0x0a, 0x13, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, + 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, + 0x0f, 0x0a, 0x0b, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x53, 0x4d, 0x53, 0x10, 0x01, + 0x12, 0x0f, 0x0a, 0x0b, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x4f, 0x54, 0x50, 0x10, + 0x02, 0x2a, 0x66, 0x0a, 0x08, 0x4d, 0x46, 0x41, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x18, 0x0a, + 0x14, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, + 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x16, 0x0a, 0x12, 0x4d, 0x46, 0x41, 0x53, 0x54, + 0x41, 0x54, 0x45, 0x5f, 0x4e, 0x4f, 0x54, 0x5f, 0x52, 0x45, 0x41, 0x44, 0x59, 0x10, 0x01, 0x12, + 0x12, 0x0a, 0x0e, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x52, 0x45, 0x41, 0x44, + 0x59, 0x10, 0x02, 0x12, 0x14, 0x0a, 0x10, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, + 0x52, 0x45, 0x4d, 0x4f, 0x56, 0x45, 0x44, 0x10, 0x03, 0x2a, 0x62, 0x0a, 0x15, 0x4d, 0x79, 0x50, + 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4b, + 0x65, 0x79, 0x12, 0x25, 0x0a, 0x21, 0x4d, 0x59, 0x50, 0x52, 0x4f, 0x4a, 0x45, 0x43, 0x54, 0x4f, + 0x52, 0x47, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4b, 0x45, 0x59, 0x5f, 0x55, 0x4e, 0x53, 0x50, + 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x22, 0x0a, 0x1e, 0x4d, 0x59, 0x50, + 0x52, 0x4f, 0x4a, 0x45, 0x43, 0x54, 0x4f, 0x52, 0x47, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4b, + 0x45, 0x59, 0x5f, 0x4f, 0x52, 0x47, 0x5f, 0x4e, 0x41, 0x4d, 0x45, 0x10, 0x01, 0x2a, 0x60, 0x0a, + 0x0c, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x12, 0x17, 0x0a, + 0x13, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x45, 0x51, + 0x55, 0x41, 0x4c, 0x53, 0x10, 0x00, 0x12, 0x1c, 0x0a, 0x18, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, + 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x53, 0x54, 0x41, 0x52, 0x54, 0x53, 0x5f, 0x57, 0x49, + 0x54, 0x48, 0x10, 0x01, 0x12, 0x19, 0x0a, 0x15, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4d, 0x45, + 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x43, 0x4f, 0x4e, 0x54, 0x41, 0x49, 0x4e, 0x53, 0x10, 0x02, 0x32, + 0xba, 0x19, 0x0a, 0x0b, 0x41, 0x75, 0x74, 0x68, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, + 0x4b, 0x0a, 0x07, 0x48, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x7a, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x10, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x0a, 0x12, 0x08, 0x2f, 0x68, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x7a, 0x12, 0x47, 0x0a, 0x05, + 0x52, 0x65, 0x61, 0x64, 0x79, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, + 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x16, 0x2e, + 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, + 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x0e, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x08, 0x12, 0x06, 0x2f, + 0x72, 0x65, 0x61, 0x64, 0x79, 0x12, 0x4e, 0x0a, 0x08, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, + 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, + 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x17, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x53, 0x74, 0x72, 0x75, + 0x63, 0x74, 0x22, 0x11, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x0b, 0x12, 0x09, 0x2f, 0x76, 0x61, 0x6c, + 0x69, 0x64, 0x61, 0x74, 0x65, 0x12, 0x7f, 0x0a, 0x11, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x25, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, + 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, + 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x73, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x12, 0x12, 0x10, 0x2f, 0x6d, 0x65, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x65, 0x73, 0x73, 0x69, + 0x6f, 0x6e, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, + 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x10, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, + 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, + 0x66, 0x69, 0x6c, 0x65, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x12, 0x11, 0x2f, 0x75, + 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x97, 0x01, 0x0a, 0x13, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, + 0x6c, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x22, 0x2f, 0x82, 0xd3, 0xe4, + 0x93, 0x02, 0x16, 0x1a, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, + 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x74, 0x0a, 0x0e, + 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x16, + 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, + 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, + 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x2a, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x11, 0x12, 0x0f, + 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, + 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, + 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, + 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x2d, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x14, 0x1a, 0x0f, 0x2f, + 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x3a, 0x01, + 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, + 0x61, 0x74, 0x65, 0x64, 0x12, 0x91, 0x01, 0x0a, 0x11, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, + 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, + 0x69, 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, + 0x79, 0x22, 0x35, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1c, 0x22, 0x17, 0x2f, 0x75, 0x73, 0x65, 0x72, + 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, + 0x66, 0x79, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x92, 0x01, 0x0a, 0x1d, 0x52, 0x65, 0x73, + 0x65, 0x6e, 0x64, 0x4d, 0x79, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x4d, 0x61, 0x69, 0x6c, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x41, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x28, 0x22, 0x23, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, + 0x61, 0x69, 0x6c, 0x2f, 0x5f, 0x72, 0x65, 0x73, 0x65, 0x6e, 0x64, 0x76, 0x65, 0x72, 0x69, 0x66, + 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, + 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x74, 0x0a, + 0x0e, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, + 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, + 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x2a, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x11, 0x12, + 0x0f, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, + 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, + 0x74, 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x4d, 0x79, + 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2b, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, + 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, + 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x2d, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x14, 0x1a, 0x0f, + 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x3a, + 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, + 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2b, 0x2e, 0x7a, 0x69, + 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, + 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, + 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, + 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, + 0x22, 0x35, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1c, 0x22, 0x17, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, + 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, + 0x79, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, + 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x92, 0x01, 0x0a, 0x1d, 0x52, 0x65, 0x73, 0x65, + 0x6e, 0x64, 0x4d, 0x79, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x63, + 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, + 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, + 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x41, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x28, 0x22, 0x23, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, + 0x6e, 0x65, 0x2f, 0x5f, 0x72, 0x65, 0x73, 0x65, 0x6e, 0x64, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x10, + 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, + 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, + 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x13, 0x12, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x61, 0x64, + 0x64, 0x72, 0x65, 0x73, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x97, 0x01, 0x0a, 0x13, 0x55, 0x70, 0x64, + 0x61, 0x74, 0x65, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, + 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, + 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, + 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, + 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, + 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, + 0x73, 0x22, 0x2f, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x16, 0x1a, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, + 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x3a, 0x01, 0x2a, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x71, 0x0a, 0x09, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x4d, 0x66, 0x61, 0x73, 0x12, + 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, + 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x75, + 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, 0x6f, 0x72, 0x73, 0x22, 0x29, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x10, 0x12, 0x0e, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, + 0x61, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x80, 0x01, 0x0a, 0x0d, 0x53, 0x65, 0x74, 0x4d, 0x79, 0x50, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x12, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, + 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, + 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x31, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x18, 0x1a, 0x13, 0x2f, + 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x73, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x8a, 0x01, 0x0a, 0x10, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x4d, 0x79, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x12, 0x23, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, 0x6e, + 0x67, 0x65, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x20, 0x1a, 0x1b, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x73, 0x2f, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x3a, + 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x79, 0x0a, 0x09, 0x41, 0x64, 0x64, 0x4d, 0x66, 0x61, 0x4f, + 0x54, 0x50, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x23, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, + 0x2f, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x16, 0x22, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, + 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, 0x2f, 0x6f, 0x74, 0x70, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0x8f, 0x01, 0x0a, 0x0c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, 0x61, 0x4f, 0x54, + 0x50, 0x12, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, + 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, + 0x61, 0x4f, 0x74, 0x70, 0x1a, 0x23, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x66, 0x61, 0x4f, 0x74, + 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x37, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x1e, 0x1a, 0x19, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, + 0x2f, 0x6f, 0x74, 0x70, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x3a, 0x01, 0x2a, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x6c, 0x0a, 0x0c, 0x52, 0x65, 0x6d, 0x6f, 0x76, 0x65, 0x4d, 0x66, 0x61, 0x4f, + 0x54, 0x50, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x2a, 0x11, 0x2f, 0x75, 0x73, 0x65, + 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, 0x2f, 0x6f, 0x74, 0x70, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0xb1, 0x01, 0x0a, 0x13, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x79, 0x50, 0x72, 0x6f, + 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x73, 0x12, 0x2e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, + 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, + 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x2f, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, + 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, + 0x68, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x20, 0x22, 0x1b, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x70, 0x72, 0x6f, 0x6a, 0x65, + 0x63, 0x74, 0x6f, 0x72, 0x67, 0x73, 0x2f, 0x5f, 0x73, 0x65, 0x61, 0x72, 0x63, 0x68, 0x3a, 0x01, + 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, + 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x0a, 0x49, 0x73, 0x49, 0x61, 0x6d, 0x41, 0x64, 0x6d, + 0x69, 0x6e, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x24, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x49, 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, + 0x22, 0x2e, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x15, 0x12, 0x13, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, + 0x6c, 0x2f, 0x5f, 0x69, 0x73, 0x69, 0x61, 0x6d, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0x89, 0x01, 0x0a, 0x17, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x5a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, + 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, + 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x22, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x65, 0x72, + 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x22, 0x32, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x19, + 0x12, 0x17, 0x2f, 0x70, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7a, + 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x6d, 0x65, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x42, 0xb7, 0x01, 0x5a, + 0x29, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, 0x73, + 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, 0x74, + 0x68, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x92, 0x41, 0x88, 0x01, 0x12, 0x3b, + 0x0a, 0x08, 0x41, 0x75, 0x74, 0x68, 0x20, 0x41, 0x50, 0x49, 0x22, 0x2a, 0x12, 0x28, 0x68, 0x74, + 0x74, 0x70, 0x73, 0x3a, 0x2f, 0x2f, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, + 0x2f, 0x63, 0x61, 0x6f, 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, + 0x67, 0x2f, 0x61, 0x75, 0x74, 0x68, 0x32, 0x03, 0x30, 0x2e, 0x31, 0x2a, 0x01, 0x02, 0x32, 0x10, + 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6a, 0x73, 0x6f, 0x6e, + 0x32, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, + 0x70, 0x63, 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, + 0x6a, 0x73, 0x6f, 0x6e, 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, + 0x6e, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, +} + +var ( + file_auth_proto_rawDescOnce sync.Once + file_auth_proto_rawDescData = file_auth_proto_rawDesc +) + +func file_auth_proto_rawDescGZIP() []byte { + file_auth_proto_rawDescOnce.Do(func() { + file_auth_proto_rawDescData = protoimpl.X.CompressGZIP(file_auth_proto_rawDescData) + }) + return file_auth_proto_rawDescData +} + +var file_auth_proto_enumTypes = make([]protoimpl.EnumInfo, 8) +var file_auth_proto_msgTypes = make([]protoimpl.MessageInfo, 29) +var file_auth_proto_goTypes = []interface{}{ + (UserSessionState)(0), // 0: zitadel.auth.api.v1.UserSessionState + (OIDCResponseType)(0), // 1: zitadel.auth.api.v1.OIDCResponseType + (UserState)(0), // 2: zitadel.auth.api.v1.UserState + (Gender)(0), // 3: zitadel.auth.api.v1.Gender + (MfaType)(0), // 4: zitadel.auth.api.v1.MfaType + (MFAState)(0), // 5: zitadel.auth.api.v1.MFAState + (MyProjectOrgSearchKey)(0), // 6: zitadel.auth.api.v1.MyProjectOrgSearchKey + (SearchMethod)(0), // 7: zitadel.auth.api.v1.SearchMethod + (*UserSessionViews)(nil), // 8: zitadel.auth.api.v1.UserSessionViews + (*UserSessionView)(nil), // 9: zitadel.auth.api.v1.UserSessionView + (*UserID)(nil), // 10: zitadel.auth.api.v1.UserID + (*User)(nil), // 11: zitadel.auth.api.v1.User + (*UserProfile)(nil), // 12: zitadel.auth.api.v1.UserProfile + (*UpdateUserProfileRequest)(nil), // 13: zitadel.auth.api.v1.UpdateUserProfileRequest + (*UserEmail)(nil), // 14: zitadel.auth.api.v1.UserEmail + (*VerifyMyUserEmailRequest)(nil), // 15: zitadel.auth.api.v1.VerifyMyUserEmailRequest + (*VerifyUserEmailRequest)(nil), // 16: zitadel.auth.api.v1.VerifyUserEmailRequest + (*UpdateUserEmailRequest)(nil), // 17: zitadel.auth.api.v1.UpdateUserEmailRequest + (*UserPhone)(nil), // 18: zitadel.auth.api.v1.UserPhone + (*UpdateUserPhoneRequest)(nil), // 19: zitadel.auth.api.v1.UpdateUserPhoneRequest + (*VerifyUserPhoneRequest)(nil), // 20: zitadel.auth.api.v1.VerifyUserPhoneRequest + (*UserAddress)(nil), // 21: zitadel.auth.api.v1.UserAddress + (*UpdateUserAddressRequest)(nil), // 22: zitadel.auth.api.v1.UpdateUserAddressRequest + (*PasswordID)(nil), // 23: zitadel.auth.api.v1.PasswordID + (*PasswordRequest)(nil), // 24: zitadel.auth.api.v1.PasswordRequest + (*PasswordChange)(nil), // 25: zitadel.auth.api.v1.PasswordChange + (*VerifyMfaOtp)(nil), // 26: zitadel.auth.api.v1.VerifyMfaOtp + (*MultiFactors)(nil), // 27: zitadel.auth.api.v1.MultiFactors + (*MultiFactor)(nil), // 28: zitadel.auth.api.v1.MultiFactor + (*MfaOtpResponse)(nil), // 29: zitadel.auth.api.v1.MfaOtpResponse + (*OIDCClientAuth)(nil), // 30: zitadel.auth.api.v1.OIDCClientAuth + (*MyProjectOrgSearchRequest)(nil), // 31: zitadel.auth.api.v1.MyProjectOrgSearchRequest + (*MyProjectOrgSearchQuery)(nil), // 32: zitadel.auth.api.v1.MyProjectOrgSearchQuery + (*MyProjectOrgSearchResponse)(nil), // 33: zitadel.auth.api.v1.MyProjectOrgSearchResponse + (*IsAdminResponse)(nil), // 34: zitadel.auth.api.v1.IsAdminResponse + (*Org)(nil), // 35: zitadel.auth.api.v1.Org + (*MyPermissions)(nil), // 36: zitadel.auth.api.v1.MyPermissions + (*timestamp.Timestamp)(nil), // 37: google.protobuf.Timestamp + (*empty.Empty)(nil), // 38: google.protobuf.Empty + (*_struct.Struct)(nil), // 39: google.protobuf.Struct +} +var file_auth_proto_depIdxs = []int32{ + 9, // 0: zitadel.auth.api.v1.UserSessionViews.user_sessions:type_name -> zitadel.auth.api.v1.UserSessionView + 0, // 1: zitadel.auth.api.v1.UserSessionView.auth_state:type_name -> zitadel.auth.api.v1.UserSessionState + 2, // 2: zitadel.auth.api.v1.User.state:type_name -> zitadel.auth.api.v1.UserState + 37, // 3: zitadel.auth.api.v1.User.creation_date:type_name -> google.protobuf.Timestamp + 37, // 4: zitadel.auth.api.v1.User.activation_date:type_name -> google.protobuf.Timestamp + 37, // 5: zitadel.auth.api.v1.User.change_date:type_name -> google.protobuf.Timestamp + 37, // 6: zitadel.auth.api.v1.User.last_login:type_name -> google.protobuf.Timestamp + 37, // 7: zitadel.auth.api.v1.User.password_changed:type_name -> google.protobuf.Timestamp + 3, // 8: zitadel.auth.api.v1.User.gender:type_name -> zitadel.auth.api.v1.Gender + 3, // 9: zitadel.auth.api.v1.UserProfile.gender:type_name -> zitadel.auth.api.v1.Gender + 3, // 10: zitadel.auth.api.v1.UpdateUserProfileRequest.gender:type_name -> zitadel.auth.api.v1.Gender + 28, // 11: zitadel.auth.api.v1.MultiFactors.mfas:type_name -> zitadel.auth.api.v1.MultiFactor + 4, // 12: zitadel.auth.api.v1.MultiFactor.type:type_name -> zitadel.auth.api.v1.MfaType + 5, // 13: zitadel.auth.api.v1.MultiFactor.state:type_name -> zitadel.auth.api.v1.MFAState + 5, // 14: zitadel.auth.api.v1.MfaOtpResponse.state:type_name -> zitadel.auth.api.v1.MFAState + 32, // 15: zitadel.auth.api.v1.MyProjectOrgSearchRequest.queries:type_name -> zitadel.auth.api.v1.MyProjectOrgSearchQuery + 6, // 16: zitadel.auth.api.v1.MyProjectOrgSearchQuery.key:type_name -> zitadel.auth.api.v1.MyProjectOrgSearchKey + 7, // 17: zitadel.auth.api.v1.MyProjectOrgSearchQuery.method:type_name -> zitadel.auth.api.v1.SearchMethod + 35, // 18: zitadel.auth.api.v1.MyProjectOrgSearchResponse.result:type_name -> zitadel.auth.api.v1.Org + 38, // 19: zitadel.auth.api.v1.AuthService.Healthz:input_type -> google.protobuf.Empty + 38, // 20: zitadel.auth.api.v1.AuthService.Ready:input_type -> google.protobuf.Empty + 38, // 21: zitadel.auth.api.v1.AuthService.Validate:input_type -> google.protobuf.Empty + 38, // 22: zitadel.auth.api.v1.AuthService.GetMyUserSessions:input_type -> google.protobuf.Empty + 38, // 23: zitadel.auth.api.v1.AuthService.GetMyUserProfile:input_type -> google.protobuf.Empty + 13, // 24: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:input_type -> zitadel.auth.api.v1.UpdateUserProfileRequest + 38, // 25: zitadel.auth.api.v1.AuthService.GetMyUserEmail:input_type -> google.protobuf.Empty + 17, // 26: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:input_type -> zitadel.auth.api.v1.UpdateUserEmailRequest + 15, // 27: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:input_type -> zitadel.auth.api.v1.VerifyMyUserEmailRequest + 38, // 28: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:input_type -> google.protobuf.Empty + 38, // 29: zitadel.auth.api.v1.AuthService.GetMyUserPhone:input_type -> google.protobuf.Empty + 19, // 30: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:input_type -> zitadel.auth.api.v1.UpdateUserPhoneRequest + 20, // 31: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:input_type -> zitadel.auth.api.v1.VerifyUserPhoneRequest + 38, // 32: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:input_type -> google.protobuf.Empty + 38, // 33: zitadel.auth.api.v1.AuthService.GetMyUserAddress:input_type -> google.protobuf.Empty + 22, // 34: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:input_type -> zitadel.auth.api.v1.UpdateUserAddressRequest + 38, // 35: zitadel.auth.api.v1.AuthService.GetMyMfas:input_type -> google.protobuf.Empty + 24, // 36: zitadel.auth.api.v1.AuthService.SetMyPassword:input_type -> zitadel.auth.api.v1.PasswordRequest + 25, // 37: zitadel.auth.api.v1.AuthService.ChangeMyPassword:input_type -> zitadel.auth.api.v1.PasswordChange + 38, // 38: zitadel.auth.api.v1.AuthService.AddMfaOTP:input_type -> google.protobuf.Empty + 26, // 39: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:input_type -> zitadel.auth.api.v1.VerifyMfaOtp + 38, // 40: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:input_type -> google.protobuf.Empty + 31, // 41: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:input_type -> zitadel.auth.api.v1.MyProjectOrgSearchRequest + 38, // 42: zitadel.auth.api.v1.AuthService.IsIamAdmin:input_type -> google.protobuf.Empty + 38, // 43: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:input_type -> google.protobuf.Empty + 38, // 44: zitadel.auth.api.v1.AuthService.Healthz:output_type -> google.protobuf.Empty + 38, // 45: zitadel.auth.api.v1.AuthService.Ready:output_type -> google.protobuf.Empty + 39, // 46: zitadel.auth.api.v1.AuthService.Validate:output_type -> google.protobuf.Struct + 8, // 47: zitadel.auth.api.v1.AuthService.GetMyUserSessions:output_type -> zitadel.auth.api.v1.UserSessionViews + 12, // 48: zitadel.auth.api.v1.AuthService.GetMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 12, // 49: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 14, // 50: zitadel.auth.api.v1.AuthService.GetMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 14, // 51: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 38, // 52: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:output_type -> google.protobuf.Empty + 38, // 53: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:output_type -> google.protobuf.Empty + 18, // 54: zitadel.auth.api.v1.AuthService.GetMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 18, // 55: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 38, // 56: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:output_type -> google.protobuf.Empty + 38, // 57: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:output_type -> google.protobuf.Empty + 21, // 58: zitadel.auth.api.v1.AuthService.GetMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 21, // 59: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 27, // 60: zitadel.auth.api.v1.AuthService.GetMyMfas:output_type -> zitadel.auth.api.v1.MultiFactors + 38, // 61: zitadel.auth.api.v1.AuthService.SetMyPassword:output_type -> google.protobuf.Empty + 38, // 62: zitadel.auth.api.v1.AuthService.ChangeMyPassword:output_type -> google.protobuf.Empty + 29, // 63: zitadel.auth.api.v1.AuthService.AddMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 29, // 64: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 38, // 65: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:output_type -> google.protobuf.Empty + 33, // 66: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:output_type -> zitadel.auth.api.v1.MyProjectOrgSearchResponse + 34, // 67: zitadel.auth.api.v1.AuthService.IsIamAdmin:output_type -> zitadel.auth.api.v1.IsAdminResponse + 36, // 68: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:output_type -> zitadel.auth.api.v1.MyPermissions + 44, // [44:69] is the sub-list for method output_type + 19, // [19:44] is the sub-list for method input_type + 19, // [19:19] is the sub-list for extension type_name + 19, // [19:19] is the sub-list for extension extendee + 0, // [0:19] is the sub-list for field type_name +} + +func init() { file_auth_proto_init() } +func file_auth_proto_init() { + if File_auth_proto != nil { + return + } + if !protoimpl.UnsafeEnabled { + file_auth_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserSessionViews); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserSessionView); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserID); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*User); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserProfile); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserProfileRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserEmail); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyMyUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserPhone); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserPhoneRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyUserPhoneRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserAddress); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserAddressRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordID); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordChange); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyMfaOtp); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MultiFactors); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MultiFactor); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MfaOtpResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*OIDCClientAuth); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchQuery); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[25].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[26].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*IsAdminResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[27].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*Org); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[28].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyPermissions); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + } + type x struct{} + out := protoimpl.TypeBuilder{ + File: protoimpl.DescBuilder{ + GoPackagePath: reflect.TypeOf(x{}).PkgPath(), + RawDescriptor: file_auth_proto_rawDesc, + NumEnums: 8, + NumMessages: 29, + NumExtensions: 0, + NumServices: 1, + }, + GoTypes: file_auth_proto_goTypes, + DependencyIndexes: file_auth_proto_depIdxs, + EnumInfos: file_auth_proto_enumTypes, + MessageInfos: file_auth_proto_msgTypes, + }.Build() + File_auth_proto = out.File + file_auth_proto_rawDesc = nil + file_auth_proto_goTypes = nil + file_auth_proto_depIdxs = nil +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AuthServiceClient is the client API for AuthService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AuthServiceClient interface { + // Readiness + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + // Authorization + GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) + //User + GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) + UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) + ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) + ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) + UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) + SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) + // MFA + AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) + VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) + RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) +} + +type authServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAuthServiceClient(cc grpc.ClientConnInterface) AuthServiceClient { + return &authServiceClient{cc} +} + +func (c *authServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) { + out := new(UserSessionViews) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SetMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AddMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) { + out := new(MyProjectOrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) { + out := new(IsAdminResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsIamAdmin", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) { + out := new(MyPermissions) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AuthServiceServer is the server API for AuthService service. +type AuthServiceServer interface { + // Readiness + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + // Authorization + GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) + //User + GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) + UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) + ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) + ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) + GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) + ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) + ResendMyPhoneVerificationCode(context.Context, *empty.Empty) (*empty.Empty, error) + GetMyUserAddress(context.Context, *empty.Empty) (*UserAddress, error) + UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) + SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) + // MFA + AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) + VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) + RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) + SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(context.Context, *empty.Empty) (*MyPermissions, error) +} + +// UnimplementedAuthServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAuthServiceServer struct { +} + +func (*UnimplementedAuthServiceServer) Healthz(context.Context, *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAuthServiceServer) Ready(context.Context, *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAuthServiceServer) Validate(context.Context, *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserSessions not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyEmailVerificationMail not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyPhoneVerificationCode(context.Context, *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyPhoneVerificationCode not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserAddress(context.Context, *empty.Empty) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyMfas not implemented") +} +func (*UnimplementedAuthServiceServer) SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchMyProjectOrgs not implemented") +} +func (*UnimplementedAuthServiceServer) IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsIamAdmin not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyZitadelPermissions(context.Context, *empty.Empty) (*MyPermissions, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyZitadelPermissions not implemented") +} + +func RegisterAuthServiceServer(s *grpc.Server, srv AuthServiceServer) { + s.RegisterService(&_AuthService_serviceDesc, srv) +} + +func _AuthService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMyUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, req.(*VerifyMyUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, req.(*VerifyUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyMfas(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SetMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SetMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SetMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SetMyPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, req.(*PasswordChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_AddMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).AddMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/AddMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).AddMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMfaOtp) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, req.(*VerifyMfaOtp)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RemoveMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchMyProjectOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(MyProjectOrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, req.(*MyProjectOrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_IsIamAdmin_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).IsIamAdmin(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/IsIamAdmin", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).IsIamAdmin(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyZitadelPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +var _AuthService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.auth.api.v1.AuthService", + HandlerType: (*AuthServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AuthService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AuthService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AuthService_Validate_Handler, + }, + { + MethodName: "GetMyUserSessions", + Handler: _AuthService_GetMyUserSessions_Handler, + }, + { + MethodName: "GetMyUserProfile", + Handler: _AuthService_GetMyUserProfile_Handler, + }, + { + MethodName: "UpdateMyUserProfile", + Handler: _AuthService_UpdateMyUserProfile_Handler, + }, + { + MethodName: "GetMyUserEmail", + Handler: _AuthService_GetMyUserEmail_Handler, + }, + { + MethodName: "ChangeMyUserEmail", + Handler: _AuthService_ChangeMyUserEmail_Handler, + }, + { + MethodName: "VerifyMyUserEmail", + Handler: _AuthService_VerifyMyUserEmail_Handler, + }, + { + MethodName: "ResendMyEmailVerificationMail", + Handler: _AuthService_ResendMyEmailVerificationMail_Handler, + }, + { + MethodName: "GetMyUserPhone", + Handler: _AuthService_GetMyUserPhone_Handler, + }, + { + MethodName: "ChangeMyUserPhone", + Handler: _AuthService_ChangeMyUserPhone_Handler, + }, + { + MethodName: "VerifyMyUserPhone", + Handler: _AuthService_VerifyMyUserPhone_Handler, + }, + { + MethodName: "ResendMyPhoneVerificationCode", + Handler: _AuthService_ResendMyPhoneVerificationCode_Handler, + }, + { + MethodName: "GetMyUserAddress", + Handler: _AuthService_GetMyUserAddress_Handler, + }, + { + MethodName: "UpdateMyUserAddress", + Handler: _AuthService_UpdateMyUserAddress_Handler, + }, + { + MethodName: "GetMyMfas", + Handler: _AuthService_GetMyMfas_Handler, + }, + { + MethodName: "SetMyPassword", + Handler: _AuthService_SetMyPassword_Handler, + }, + { + MethodName: "ChangeMyPassword", + Handler: _AuthService_ChangeMyPassword_Handler, + }, + { + MethodName: "AddMfaOTP", + Handler: _AuthService_AddMfaOTP_Handler, + }, + { + MethodName: "VerifyMfaOTP", + Handler: _AuthService_VerifyMfaOTP_Handler, + }, + { + MethodName: "RemoveMfaOTP", + Handler: _AuthService_RemoveMfaOTP_Handler, + }, + { + MethodName: "SearchMyProjectOrgs", + Handler: _AuthService_SearchMyProjectOrgs_Handler, + }, + { + MethodName: "IsIamAdmin", + Handler: _AuthService_IsIamAdmin_Handler, + }, + { + MethodName: "GetMyZitadelPermissions", + Handler: _AuthService_GetMyZitadelPermissions_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "auth.proto", +} diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go new file mode 100644 index 0000000000..d089ded1b3 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.gw.go @@ -0,0 +1,1004 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: auth.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AuthService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyMfas_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SetMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AddMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AddMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaOtp + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.RemoveMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq MyProjectOrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchMyProjectOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_IsIamAdmin_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.IsIamAdmin(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyZitadelPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyZitadelPermissions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAuthServiceHandler(ctx, mux, conn) +} + +// RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn)) +} + +// RegisterAuthServiceHandlerClient registers the http handlers for service AuthService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AuthServiceClient" to call the correct interceptors. +func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error { + + mux.Handle("GET", pattern_AuthService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SetMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SetMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SetMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AddMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AddMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AddMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_RemoveMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RemoveMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RemoveMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchMyProjectOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchMyProjectOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsIamAdmin_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsIamAdmin_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsIamAdmin_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyZitadelPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyZitadelPermissions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyZitadelPermissions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AuthService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AuthService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AuthService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AuthService_GetMyUserSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"me", "usersessions"}, "")) + + pattern_AuthService_GetMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_UpdateMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_GetMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_ChangeMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_VerifyMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_verify"}, "")) + + pattern_AuthService_ResendMyEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_ChangeMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_VerifyMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_verify"}, "")) + + pattern_AuthService_ResendMyPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_UpdateMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_GetMyMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "mfas"}, "")) + + pattern_AuthService_SetMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "passwords"}, "")) + + pattern_AuthService_ChangeMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "passwords", "_change"}, "")) + + pattern_AuthService_AddMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_VerifyMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"users", "me", "mfa", "otp", "_verify"}, "")) + + pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) + + pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) + + pattern_AuthService_GetMyZitadelPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"permissions", "zitadel", "me"}, "")) +) + +var ( + forward_AuthService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AuthService_Ready_0 = runtime.ForwardResponseMessage + + forward_AuthService_Validate_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyMfas_0 = runtime.ForwardResponseMessage + + forward_AuthService_SetMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_AddMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyZitadelPermissions_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/auth/api/grpc/auth.swagger.json b/pkg/auth/api/grpc/auth.swagger.json new file mode 100644 index 0000000000..aafd5141dc --- /dev/null +++ b/pkg/auth/api/grpc/auth.swagger.json @@ -0,0 +1,1016 @@ +{ + "swagger": "2.0", + "info": { + "title": "Auth API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/auth" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/global/_isiamadmin": { + "get": { + "operationId": "IsIamAdmin", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1IsAdminResponse" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/global/projectorgs/_search": { + "post": { + "operationId": "SearchMyProjectOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/healthz": { + "get": { + "summary": "Readiness", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/me/usersessions": { + "get": { + "summary": "Authorization", + "operationId": "GetMyUserSessions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSessionViews" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/permissions/zitadel/me": { + "get": { + "summary": "Permission", + "operationId": "GetMyZitadelPermissions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyPermissions" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/users/me/address": { + "get": { + "operationId": "GetMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email": { + "get": { + "operationId": "GetMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_resendverification": { + "post": { + "operationId": "ResendMyEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_verify": { + "post": { + "operationId": "VerifyMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMyUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp": { + "delete": { + "operationId": "RemoveMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + }, + "post": { + "summary": "MFA", + "operationId": "AddMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp/_verify": { + "put": { + "operationId": "VerifyMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMfaOtp" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfas": { + "get": { + "operationId": "GetMyMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords": { + "put": { + "operationId": "SetMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords/_change": { + "put": { + "operationId": "ChangeMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordChange" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone": { + "get": { + "operationId": "GetMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_resendverification": { + "post": { + "operationId": "ResendMyPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_verify": { + "post": { + "operationId": "VerifyMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/profile": { + "get": { + "summary": "User", + "operationId": "GetMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AuthService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1IsAdminResponse": { + "type": "object", + "properties": { + "is_admin": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaOtpResponse": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "url": { + "type": "string" + }, + "secret": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1MyPermissions": { + "type": "object", + "properties": { + "permissions": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1MyProjectOrgSearchKey": { + "type": "string", + "enum": [ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + "MYPROJECTORGSEARCHKEY_ORG_NAME" + ], + "default": "MYPROJECTORGSEARCHKEY_UNSPECIFIED" + }, + "v1MyProjectOrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1MyProjectOrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1MyProjectOrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MyProjectOrgSearchQuery" + } + } + } + }, + "v1MyProjectOrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1PasswordChange": { + "type": "object", + "properties": { + "old_password": { + "type": "string" + }, + "new_password": { + "type": "string" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "password": { + "type": "string" + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "phone": { + "type": "string" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1UserSessionState": { + "type": "string", + "enum": [ + "USERSESSIONSTATE_UNSPECIFIED", + "USERSESSIONSTATE_ACTIVE", + "USERSESSIONSTATE_TERMINATED" + ], + "default": "USERSESSIONSTATE_UNSPECIFIED" + }, + "v1UserSessionView": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "agent_id": { + "type": "string" + }, + "auth_state": { + "$ref": "#/definitions/v1UserSessionState" + }, + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSessionViews": { + "type": "object", + "properties": { + "user_sessions": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSessionView" + } + } + } + }, + "v1VerifyMfaOtp": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyMyUserEmailRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyUserPhoneRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + } + } +} diff --git a/pkg/auth/api/grpc/gateway.go b/pkg/auth/api/grpc/gateway.go new file mode 100644 index 0000000000..7bdea9d1f6 --- /dev/null +++ b/pkg/auth/api/grpc/gateway.go @@ -0,0 +1,49 @@ +package grpc + +import ( + "strings" + + "github.com/grpc-ecosystem/grpc-gateway/runtime" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" +) + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterAuthServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/auth/api/grpc/generate.go b/pkg/auth/api/grpc/generate.go new file mode 100644 index 0000000000..fa48cd13ab --- /dev/null +++ b/pkg/auth/api/grpc/generate.go @@ -0,0 +1,5 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto +//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/zitadel/pkg/auth/api/grpc AuthServiceClient +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/auth/api/grpc/grant.go b/pkg/auth/api/grpc/grant.go new file mode 100644 index 0000000000..8eb8681e06 --- /dev/null +++ b/pkg/auth/api/grpc/grant.go @@ -0,0 +1,15 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) SearchMyProjectOrgs(ctx context.Context, request *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8kdRf", "Not implemented") +} + +func (s *Server) IsIamAdmin(ctx context.Context, _ *empty.Empty) (*IsAdminResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9odFv", "Not implemented") +} diff --git a/pkg/auth/api/grpc/mock/auth.proto.mock.go b/pkg/auth/api/grpc/mock/auth.proto.mock.go new file mode 100644 index 0000000000..f829479430 --- /dev/null +++ b/pkg/auth/api/grpc/mock/auth.proto.mock.go @@ -0,0 +1,538 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/auth/api/grpc (interfaces: AuthServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/auth/api/grpc" + gomock "github.com/golang/mock/gomock" + grpc0 "google.golang.org/grpc" + emptypb "google.golang.org/protobuf/types/known/emptypb" + structpb "google.golang.org/protobuf/types/known/structpb" + reflect "reflect" +) + +// MockAuthServiceClient is a mock of AuthServiceClient interface +type MockAuthServiceClient struct { + ctrl *gomock.Controller + recorder *MockAuthServiceClientMockRecorder +} + +// MockAuthServiceClientMockRecorder is the mock recorder for MockAuthServiceClient +type MockAuthServiceClientMockRecorder struct { + mock *MockAuthServiceClient +} + +// NewMockAuthServiceClient creates a new mock instance +func NewMockAuthServiceClient(ctrl *gomock.Controller) *MockAuthServiceClient { + mock := &MockAuthServiceClient{ctrl: ctrl} + mock.recorder = &MockAuthServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAuthServiceClient) EXPECT() *MockAuthServiceClientMockRecorder { + return m.recorder +} + +// AddMfaOTP mocks base method +func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddMfaOTP indicates an expected call of AddMfaOTP +func (mr *MockAuthServiceClientMockRecorder) AddMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).AddMfaOTP), varargs...) +} + +// ChangeMyPassword mocks base method +func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyPassword", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyPassword indicates an expected call of ChangeMyPassword +func (mr *MockAuthServiceClientMockRecorder) ChangeMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyPassword), varargs...) +} + +// ChangeMyUserEmail mocks base method +func (m *MockAuthServiceClient) ChangeMyUserEmail(arg0 context.Context, arg1 *grpc.UpdateUserEmailRequest, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserEmail indicates an expected call of ChangeMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserEmail), varargs...) +} + +// ChangeMyUserPhone mocks base method +func (m *MockAuthServiceClient) ChangeMyUserPhone(arg0 context.Context, arg1 *grpc.UpdateUserPhoneRequest, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserPhone indicates an expected call of ChangeMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserPhone), varargs...) +} + +// GetMyMfas mocks base method +func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyMfas", varargs...) + ret0, _ := ret[0].(*grpc.MultiFactors) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyMfas indicates an expected call of GetMyMfas +func (mr *MockAuthServiceClientMockRecorder) GetMyMfas(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyMfas", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyMfas), varargs...) +} + +// GetMyUserAddress mocks base method +func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserAddress indicates an expected call of GetMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) GetMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserAddress), varargs...) +} + +// GetMyUserEmail mocks base method +func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserEmail indicates an expected call of GetMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) GetMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserEmail), varargs...) +} + +// GetMyUserPhone mocks base method +func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserPhone indicates an expected call of GetMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) GetMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserPhone), varargs...) +} + +// GetMyUserProfile mocks base method +func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserProfile indicates an expected call of GetMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) GetMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserProfile), varargs...) +} + +// GetMyUserSessions mocks base method +func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserSessions", varargs...) + ret0, _ := ret[0].(*grpc.UserSessionViews) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserSessions indicates an expected call of GetMyUserSessions +func (mr *MockAuthServiceClientMockRecorder) GetMyUserSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserSessions), varargs...) +} + +// GetMyZitadelPermissions mocks base method +func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyZitadelPermissions", varargs...) + ret0, _ := ret[0].(*grpc.MyPermissions) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyZitadelPermissions indicates an expected call of GetMyZitadelPermissions +func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...) +} + +// Healthz mocks base method +func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAuthServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAuthServiceClient)(nil).Healthz), varargs...) +} + +// IsIamAdmin mocks base method +func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsIamAdmin", varargs...) + ret0, _ := ret[0].(*grpc.IsAdminResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsIamAdmin indicates an expected call of IsIamAdmin +func (mr *MockAuthServiceClientMockRecorder) IsIamAdmin(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsIamAdmin", reflect.TypeOf((*MockAuthServiceClient)(nil).IsIamAdmin), varargs...) +} + +// Ready mocks base method +func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAuthServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAuthServiceClient)(nil).Ready), varargs...) +} + +// RemoveMfaOTP mocks base method +func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveMfaOTP", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveMfaOTP indicates an expected call of RemoveMfaOTP +func (mr *MockAuthServiceClientMockRecorder) RemoveMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).RemoveMfaOTP), varargs...) +} + +// ResendMyEmailVerificationMail mocks base method +func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyEmailVerificationMail indicates an expected call of ResendMyEmailVerificationMail +func (mr *MockAuthServiceClientMockRecorder) ResendMyEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyEmailVerificationMail), varargs...) +} + +// ResendMyPhoneVerificationCode mocks base method +func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyPhoneVerificationCode", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyPhoneVerificationCode indicates an expected call of ResendMyPhoneVerificationCode +func (mr *MockAuthServiceClientMockRecorder) ResendMyPhoneVerificationCode(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyPhoneVerificationCode", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyPhoneVerificationCode), varargs...) +} + +// SearchMyProjectOrgs mocks base method +func (m *MockAuthServiceClient) SearchMyProjectOrgs(arg0 context.Context, arg1 *grpc.MyProjectOrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.MyProjectOrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchMyProjectOrgs", varargs...) + ret0, _ := ret[0].(*grpc.MyProjectOrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchMyProjectOrgs indicates an expected call of SearchMyProjectOrgs +func (mr *MockAuthServiceClientMockRecorder) SearchMyProjectOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMyProjectOrgs", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchMyProjectOrgs), varargs...) +} + +// SetMyPassword mocks base method +func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetMyPassword", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetMyPassword indicates an expected call of SetMyPassword +func (mr *MockAuthServiceClientMockRecorder) SetMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).SetMyPassword), varargs...) +} + +// UpdateMyUserAddress mocks base method +func (m *MockAuthServiceClient) UpdateMyUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserAddress indicates an expected call of UpdateMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserAddress), varargs...) +} + +// UpdateMyUserProfile mocks base method +func (m *MockAuthServiceClient) UpdateMyUserProfile(arg0 context.Context, arg1 *grpc.UpdateUserProfileRequest, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserProfile indicates an expected call of UpdateMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserProfile), varargs...) +} + +// Validate mocks base method +func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*structpb.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*structpb.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAuthServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAuthServiceClient)(nil).Validate), varargs...) +} + +// VerifyMfaOTP mocks base method +func (m *MockAuthServiceClient) VerifyMfaOTP(arg0 context.Context, arg1 *grpc.VerifyMfaOtp, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMfaOTP indicates an expected call of VerifyMfaOTP +func (mr *MockAuthServiceClientMockRecorder) VerifyMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfaOTP), varargs...) +} + +// VerifyMyUserEmail mocks base method +func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserEmail", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserEmail indicates an expected call of VerifyMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserEmail), varargs...) +} + +// VerifyMyUserPhone mocks base method +func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserPhone", varargs...) + ret0, _ := ret[0].(*emptypb.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserPhone indicates an expected call of VerifyMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserPhone), varargs...) +} diff --git a/pkg/auth/api/grpc/permissions.go b/pkg/auth/api/grpc/permissions.go new file mode 100644 index 0000000000..998ba2ee98 --- /dev/null +++ b/pkg/auth/api/grpc/permissions.go @@ -0,0 +1,50 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetMyZitadelPermissions(ctx context.Context, _ *empty.Empty) (*MyPermissions, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-or67G", "Not implemented") + //ctxData := auth.GetCtxData(ctx) + // + //grants, err := s.processor.ResolveGrants(ctx, ctxData.UserID, ctxData.OrgID) + //if err != nil { + // return nil, err + //} + // + //permissions := &MyPermissions{Permissions: []string{}} + // + //for _, grant := range grants { + // for _, role := range grant.Roles { + // roleName, ctxID := auth.SplitPermission(role) + // for _, mapping := range s.authConf.RolePermissionMappings { + // if mapping.Role == roleName { + // permissions.appendPermissions(ctxID, mapping.Permissions...) + // } + // } + // } + //} + // + //return permissions, nil +} + +func (p *MyPermissions) appendPermissions(ctxID string, permissions ...string) { + for _, permission := range permissions { + p.appendPermission(ctxID, permission) + } +} + +func (p *MyPermissions) appendPermission(ctxID, permission string) { + if ctxID != "" { + permission = permission + ":" + ctxID + } + for _, existingPermission := range p.Permissions { + if existingPermission == permission { + return + } + } + p.Permissions = append(p.Permissions, permission) +} diff --git a/pkg/auth/api/grpc/probes.go b/pkg/auth/api/grpc/probes.go new file mode 100644 index 0000000000..c360baf3d9 --- /dev/null +++ b/pkg/auth/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bst5W", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-or0vW", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lo6Eg", "Not implemented") +} diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go new file mode 100644 index 0000000000..5af9cad064 --- /dev/null +++ b/pkg/auth/api/grpc/server.go @@ -0,0 +1,39 @@ +package grpc + +import ( + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" + "google.golang.org/grpc" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" +) + +var _ AuthServiceServer = (*Server)(nil) + +type Server struct { + port string + searchLimit int +} + +func StartServer(conf grpc_util.ServerConfig) *Server { + return &Server{ + port: conf.Port, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + middleware.ErrorHandler(), + ), + ), + ) + RegisterAuthServiceServer(gs, s) + return gs, nil +} diff --git a/pkg/auth/api/grpc/user.go b/pkg/auth/api/grpc/user.go new file mode 100644 index 0000000000..fb7604189f --- /dev/null +++ b/pkg/auth/api/grpc/user.go @@ -0,0 +1,91 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-fis93", "Not implemented") +} + +func (s *Server) GetMyUserEmail(ctx context.Context, _ *empty.Empty) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-93j5d", "Not implemented") +} + +func (s *Server) GetMyUserPhone(ctx context.Context, _ *empty.Empty) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Hj75G", "Not implemented") +} + +func (s *Server) GetMyUserAddress(ctx context.Context, _ *empty.Empty) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-21jd4", "Not implemented") +} + +func (s *Server) GetMyMfas(ctx context.Context, _ *empty.Empty) (*MultiFactors, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-vkl9i", "Not implemented") +} + +func (s *Server) UpdateMyUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented") +} + +func (s *Server) ChangeMyUserEmail(ctx context.Context, request *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lme45", "Not implemented") +} + +func (s *Server) VerifyMyUserEmail(ctx context.Context, request *VerifyMyUserEmailRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poru7", "Not implemented") +} + +func (s *Server) VerifyUserEmail(ctx context.Context, request *VerifyUserEmailRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented") +} + +func (s *Server) ResendMyEmailVerificationMail(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dh69i", "Not implemented") +} + +func (s *Server) ResendEmailVerificationMail(ctx context.Context, id *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mAq23", "Not implemented") +} + +func (s *Server) ChangeMyUserPhone(ctx context.Context, request *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk45g", "Not implemented") +} + +func (s *Server) VerifyMyUserPhone(ctx context.Context, request *VerifyUserPhoneRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ol6gE", "Not implemented") +} + +func (s *Server) ResendMyPhoneVerificationCode(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Wk8rf", "Not implemented") +} + +func (s *Server) UpdateMyUserAddress(ctx context.Context, request *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cmt7F", "Not implemented") +} + +func (s *Server) SetMyPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl9c2", "Not implemented") +} + +func (s *Server) ChangeMyPassword(ctx context.Context, request *PasswordChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlo6G", "Not implemented") +} + +func (s *Server) AddMfaOTP(ctx context.Context, _ *empty.Empty) (_ *MfaOtpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-al35G", "Not implemented") +} + +func (s *Server) VerifyMfaOTP(ctx context.Context, request *VerifyMfaOtp) (_ *MfaOtpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-kgjZ7", "Not implemented") +} + +func (s *Server) RemoveMfaOTP(ctx context.Context, _ *empty.Empty) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9k46d", "Not implemented") +} + +func (s *Server) ResendUserInitMail(ctx context.Context, request *UserID) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk467", "Not implemented") +} diff --git a/pkg/auth/api/grpc/user_session.go b/pkg/auth/api/grpc/user_session.go new file mode 100644 index 0000000000..05460f85ef --- /dev/null +++ b/pkg/auth/api/grpc/user_session.go @@ -0,0 +1,11 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetMyUserSessions(ctx context.Context, _ *empty.Empty) (_ *UserSessionViews, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nc52s", "Not implemented") +} diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto new file mode 100644 index 0000000000..9055d7f241 --- /dev/null +++ b/pkg/auth/api/proto/auth.proto @@ -0,0 +1,521 @@ +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/struct.proto"; +import "google/protobuf/timestamp.proto"; +import "validate/validate.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "authoption/options.proto"; + +package zitadel.auth.api.v1; + +option go_package = "github.com/caos/zitadel/pkg/auth/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "Auth API"; + version: "0.1"; + contact:{ + url: "https://github.com/caos/zitadel/pkg/auth" + }; + }; + + schemes: HTTPS; + + consumes: "application/json"; + consumes: "application/grpc"; + + produces: "application/json"; + produces: "application/grpc"; +}; + +service AuthService { + // Readiness + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + + // Authorization + rpc GetMyUserSessions(google.protobuf.Empty) returns (UserSessionViews) { + option (google.api.http) = { + get: "/me/usersessions" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + //User + rpc GetMyUserProfile(google.protobuf.Empty) returns (UserProfile) { + option (google.api.http) = { + get: "/users/me/profile" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc UpdateMyUserProfile(UpdateUserProfileRequest) returns (UserProfile) { + option (google.api.http) = { + put: "/users/me/profile" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyUserEmail(google.protobuf.Empty) returns (UserEmail) { + option (google.api.http) = { + get: "/users/me/email" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ChangeMyUserEmail(UpdateUserEmailRequest) returns (UserEmail) { + option (google.api.http) = { + put: "/users/me/email" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMyUserEmail(VerifyMyUserEmailRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/email/_verify" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ResendMyEmailVerificationMail(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/email/_resendverification" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyUserPhone(google.protobuf.Empty) returns (UserPhone) { + option (google.api.http) = { + get: "/users/me/phone" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ChangeMyUserPhone(UpdateUserPhoneRequest) returns (UserPhone) { + option (google.api.http) = { + put: "/users/me/phone" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMyUserPhone(VerifyUserPhoneRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/phone/_verify" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ResendMyPhoneVerificationCode(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/phone/_resendverification" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyUserAddress(google.protobuf.Empty) returns (UserAddress) { + option (google.api.http) = { + get: "/users/me/address" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc UpdateMyUserAddress(UpdateUserAddressRequest) returns (UserAddress) { + option (google.api.http) = { + put: "/users/me/address" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyMfas(google.protobuf.Empty) returns (MultiFactors) { + option (google.api.http) = { + get: "/users/me/mfas" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + //Password + + rpc SetMyPassword(PasswordRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/users/me/passwords" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ChangeMyPassword(PasswordChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/users/me/passwords/_change" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + // MFA + rpc AddMfaOTP(google.protobuf.Empty) returns (MfaOtpResponse) { + option (google.api.http) = { + post: "/users/me/mfa/otp" + body: "*" + }; + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMfaOTP(VerifyMfaOtp) returns (MfaOtpResponse) { + option (google.api.http) = { + put: "/users/me/mfa/otp/_verify" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc RemoveMfaOTP(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/users/me/mfa/otp" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) { + option (google.api.http) = { + post: "/global/projectorgs/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc IsIamAdmin(google.protobuf.Empty) returns (IsAdminResponse) { + option (google.api.http) = { + get: "/global/_isiamadmin" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + //Permission + rpc GetMyZitadelPermissions(google.protobuf.Empty) returns (MyPermissions) { + option (google.api.http) = { + get: "/permissions/zitadel/me" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } +} + +message UserSessionViews { + repeated UserSessionView user_sessions = 1; +} +message UserSessionView { + string id = 1; + string agent_id = 2; + UserSessionState auth_state = 3; + string user_id = 4; + string user_name = 5; +} + +enum UserSessionState { + USERSESSIONSTATE_UNSPECIFIED = 0; + USERSESSIONSTATE_ACTIVE = 1; + USERSESSIONSTATE_TERMINATED = 2; +} + +enum OIDCResponseType { + OIDCRESPONSETYPE_CODE = 0; + OIDCRESPONSETYPE_ID_TOKEN = 1; + OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp activation_date = 4; + google.protobuf.Timestamp change_date = 5; + google.protobuf.Timestamp last_login = 6; + google.protobuf.Timestamp password_changed = 7; + string user_name = 8; + string first_name = 9; + string last_name = 10; + string nick_name = 11; + string display_name = 12; + string preferred_language = 13; + Gender gender = 14; + string email = 15; + bool is_email_verified = 16; + string phone = 17; + bool is_phone_verified = 18; + string country = 19; + string locality = 20; + string postal_code = 21; + string region = 22; + string street_address = 23; + bool password_change_required = 24; +} + +enum UserState { + USERSTATE_UNSPECIEFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message UserProfile { + string id = 1; + string user_name = 2; + string first_name = 3; + string last_name = 4; + string nick_name = 5; + string display_name = 6; + string preferred_language = 7; + Gender gender = 8; +} + +message UpdateUserProfileRequest { + string first_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string display_name = 4 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string preferred_language = 5 [(validate.rules).string = {min_len: 1, max_len: 200}]; + Gender gender = 6; +} + +message UserEmail { + string id = 1; + string email = 2; + bool isEmailVerified = 3; +} + +message VerifyMyUserEmailRequest { + string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message VerifyUserEmailRequest { + string id = 1; + string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UpdateUserEmailRequest { + string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UserPhone { + string id = 1; + string phone = 2; + bool is_phone_verified = 3; +} + +message UpdateUserPhoneRequest { + string phone = 1 [(validate.rules).string = {min_len: 1, max_len: 20}]; +} + +message VerifyUserPhoneRequest { + string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UserAddress { + string id = 1; + string country = 2; + string locality = 3; + string postal_code = 4; + string region = 5; + string street_address = 6; +} + +message UpdateUserAddressRequest { + string country = 1 [(validate.rules).string = {max_len: 200}]; + string locality = 2 [(validate.rules).string = {max_len: 200}]; + string postal_code = 3 [(validate.rules).string = {max_len: 200}]; + string region = 4 [(validate.rules).string = {max_len: 200}]; + string street_address = 5 [(validate.rules).string = {max_len: 200}]; +} + +message PasswordID { + string id = 1; +} + +message PasswordRequest { + string password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +message PasswordChange { + string old_password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; + string new_password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +enum MfaType { + MFATYPE_UNSPECIFIED = 0; + MFATYPE_SMS = 1; + MFATYPE_OTP = 2; +} + +message VerifyMfaOtp { + string code = 1; +} + +message MultiFactors { + repeated MultiFactor mfas = 1; +} + +message MultiFactor { + MfaType type = 1; + MFAState state = 2; +} + +message MfaOtpResponse { + string user_id = 1; + string url = 2; + string secret = 3; + MFAState state = 4; +} + +enum MFAState { + MFASTATE_UNSPECIFIED = 0; + MFASTATE_NOT_READY = 1; + MFASTATE_READY = 2; + MFASTATE_REMOVED = 3; +} + +message OIDCClientAuth { + string client_id = 1; + string client_secret = 2; +} + +message MyProjectOrgSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + bool asc = 4; + repeated MyProjectOrgSearchQuery queries = 5; +} + +message MyProjectOrgSearchQuery { + MyProjectOrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum MyProjectOrgSearchKey { + MYPROJECTORGSEARCHKEY_UNSPECIFIED = 0; + MYPROJECTORGSEARCHKEY_ORG_NAME = 1; +} + +message MyProjectOrgSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Org result = 4; +} + +message IsAdminResponse { + bool is_admin = 1; +} + +message Org { + string id = 1; + string name = 2; +} + +message MyPermissions { + repeated string permissions = 1; +} + +enum SearchMethod { + SEARCHMETHOD_EQUALS = 0; + SEARCHMETHOD_STARTS_WITH = 1; + SEARCHMETHOD_CONTAINS = 2; +} \ No newline at end of file diff --git a/pkg/auth/auth.go b/pkg/auth/auth.go index f8838f83c0..5fca24a0d0 100644 --- a/pkg/auth/auth.go +++ b/pkg/auth/auth.go @@ -2,10 +2,8 @@ package auth import ( "context" - "github.com/caos/zitadel/internal/api/auth" app "github.com/caos/zitadel/internal/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/auth/api" ) @@ -14,6 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "AUTH-l7Hdx", "not implemented yet") //TODO: implement +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) } diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go new file mode 100644 index 0000000000..39b479dc14 --- /dev/null +++ b/pkg/management/api/api.go @@ -0,0 +1,21 @@ +package api + +import ( + "context" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/management/api/grpc" +) + +type Config struct { + GRPC grpc_util.Config +} + +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) + + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) +} diff --git a/pkg/management/api/config.go b/pkg/management/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/management/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/management/api/grpc/application.go b/pkg/management/api/grpc/application.go new file mode 100644 index 0000000000..dca568a694 --- /dev/null +++ b/pkg/management/api/grpc/application.go @@ -0,0 +1,37 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchApplications(ctx context.Context, request *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-yW23f", "Not implemented") +} + +func (s *Server) ApplicationByID(ctx context.Context, request *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bmr6X", "Not implemented") +} + +func (s *Server) CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poe4d", "Not implemented") +} +func (s *Server) UpdateApplication(ctx context.Context, in *ApplicationUpdate) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bmt6J", "Not implemented") +} +func (s *Server) DeactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cD34f", "Not implemented") +} +func (s *Server) ReactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mo98S", "Not implemented") +} +func (s *Server) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate) (*OIDCConfig, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-xm56g", "Not implemented") +} +func (s *Server) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID) (*ClientSecret, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlwp3", "Not implemented") +} + +func (s *Server) ApplicationChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-due45", "Not implemented") +} diff --git a/pkg/management/api/grpc/auth_grant.go b/pkg/management/api/grpc/auth_grant.go new file mode 100644 index 0000000000..45243df663 --- /dev/null +++ b/pkg/management/api/grpc/auth_grant.go @@ -0,0 +1,10 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchAuthGrant(ctx context.Context, grantSearch *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dkwd5", "Not implemented") +} diff --git a/pkg/management/api/grpc/gateway.go b/pkg/management/api/grpc/gateway.go new file mode 100644 index 0000000000..82e595331a --- /dev/null +++ b/pkg/management/api/grpc/gateway.go @@ -0,0 +1,47 @@ +package grpc + +import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "strings" +) + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterManagementServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/management/api/grpc/generate.go b/pkg/management/api/grpc/generate.go new file mode 100644 index 0000000000..b9067afe7b --- /dev/null +++ b/pkg/management/api/grpc/generate.go @@ -0,0 +1,6 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto +//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/pkg/management/api/grpc ManagementServiceClient + +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go new file mode 100644 index 0000000000..b6c8a95c03 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -0,0 +1,521 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" +) + +/** + * ManagementService + */ + +var ManagementService_AuthMethods = utils_auth.MethodMapping{ + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.Option{ + Permission: "user.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.Option{ + Permission: "org.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.Option{ + Permission: "project.member.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.Option{ + Permission: "project.role.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.Option{ + Permission: "project.role.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.Option{ + Permission: "project.role.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, +} + +func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return middleware.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) +} diff --git a/pkg/management/api/grpc/management.pb.go b/pkg/management/api/grpc/management.pb.go new file mode 100644 index 0000000000..2cb6dc961b --- /dev/null +++ b/pkg/management/api/grpc/management.pb.go @@ -0,0 +1,12569 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: management.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + _ "github.com/golang/protobuf/protoc-gen-go/descriptor" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +type UserSearchKey int32 + +const ( + UserSearchKey_USERSEARCHKEY_UNSPECIFIED UserSearchKey = 0 + UserSearchKey_USERSEARCHKEY_USER_NAME UserSearchKey = 1 + UserSearchKey_USERSEARCHKEY_FIRST_NAME UserSearchKey = 2 + UserSearchKey_USERSEARCHKEY_LAST_NAME UserSearchKey = 3 + UserSearchKey_USERSEARCHKEY_NICK_NAME UserSearchKey = 4 + UserSearchKey_USERSEARCHKEY_DISPLAY_NAME UserSearchKey = 5 + UserSearchKey_USERSEARCHKEY_EMAIL UserSearchKey = 6 + UserSearchKey_USERSEARCHKEY_STATE UserSearchKey = 7 +) + +var UserSearchKey_name = map[int32]string{ + 0: "USERSEARCHKEY_UNSPECIFIED", + 1: "USERSEARCHKEY_USER_NAME", + 2: "USERSEARCHKEY_FIRST_NAME", + 3: "USERSEARCHKEY_LAST_NAME", + 4: "USERSEARCHKEY_NICK_NAME", + 5: "USERSEARCHKEY_DISPLAY_NAME", + 6: "USERSEARCHKEY_EMAIL", + 7: "USERSEARCHKEY_STATE", +} + +var UserSearchKey_value = map[string]int32{ + "USERSEARCHKEY_UNSPECIFIED": 0, + "USERSEARCHKEY_USER_NAME": 1, + "USERSEARCHKEY_FIRST_NAME": 2, + "USERSEARCHKEY_LAST_NAME": 3, + "USERSEARCHKEY_NICK_NAME": 4, + "USERSEARCHKEY_DISPLAY_NAME": 5, + "USERSEARCHKEY_EMAIL": 6, + "USERSEARCHKEY_STATE": 7, +} + +func (x UserSearchKey) String() string { + return proto.EnumName(UserSearchKey_name, int32(x)) +} + +func (UserSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +var SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", +} + +var SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, +} + +func (x SearchMethod) String() string { + return proto.EnumName(SearchMethod_name, int32(x)) +} + +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +var MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", +} + +var MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, +} + +func (x MfaType) String() string { + return proto.EnumName(MfaType_name, int32(x)) +} + +func (MfaType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +var MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", +} + +var MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, +} + +func (x MFAState) String() string { + return proto.EnumName(MFAState_name, int32(x)) +} + +func (MFAState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +type NotificationType int32 + +const ( + NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 + NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 +) + +var NotificationType_name = map[int32]string{ + 0: "NOTIFICATIONTYPE_EMAIL", + 1: "NOTIFICATIONTYPE_SMS", +} + +var NotificationType_value = map[string]int32{ + "NOTIFICATIONTYPE_EMAIL": 0, + "NOTIFICATIONTYPE_SMS": 1, +} + +func (x NotificationType) String() string { + return proto.EnumName(NotificationType_name, int32(x)) +} + +func (NotificationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +type PolicyState int32 + +const ( + PolicyState_POLICYSTATE_UNSPECIFIED PolicyState = 0 + PolicyState_POLICYSTATE_ACTIVE PolicyState = 1 + PolicyState_POLICYSTATE_INACTIVE PolicyState = 2 + PolicyState_POLICYSTATE_DELETED PolicyState = 3 +) + +var PolicyState_name = map[int32]string{ + 0: "POLICYSTATE_UNSPECIFIED", + 1: "POLICYSTATE_ACTIVE", + 2: "POLICYSTATE_INACTIVE", + 3: "POLICYSTATE_DELETED", +} + +var PolicyState_value = map[string]int32{ + "POLICYSTATE_UNSPECIFIED": 0, + "POLICYSTATE_ACTIVE": 1, + "POLICYSTATE_INACTIVE": 2, + "POLICYSTATE_DELETED": 3, +} + +func (x PolicyState) String() string { + return proto.EnumName(PolicyState_name, int32(x)) +} + +func (PolicyState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +type OrgMemberSearchKey int32 + +const ( + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED OrgMemberSearchKey = 0 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_FIRST_NAME OrgMemberSearchKey = 1 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_LAST_NAME OrgMemberSearchKey = 2 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_EMAIL OrgMemberSearchKey = 3 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_USER_ID OrgMemberSearchKey = 4 +) + +var OrgMemberSearchKey_name = map[int32]string{ + 0: "ORGMEMBERSEARCHKEY_UNSPECIFIED", + 1: "ORGMEMBERSEARCHKEY_FIRST_NAME", + 2: "ORGMEMBERSEARCHKEY_LAST_NAME", + 3: "ORGMEMBERSEARCHKEY_EMAIL", + 4: "ORGMEMBERSEARCHKEY_USER_ID", +} + +var OrgMemberSearchKey_value = map[string]int32{ + "ORGMEMBERSEARCHKEY_UNSPECIFIED": 0, + "ORGMEMBERSEARCHKEY_FIRST_NAME": 1, + "ORGMEMBERSEARCHKEY_LAST_NAME": 2, + "ORGMEMBERSEARCHKEY_EMAIL": 3, + "ORGMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x OrgMemberSearchKey) String() string { + return proto.EnumName(OrgMemberSearchKey_name, int32(x)) +} + +func (OrgMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +type ProjectState int32 + +const ( + ProjectState_PROJECTSTATE_UNSPECIFIED ProjectState = 0 + ProjectState_PROJECTSTATE_ACTIVE ProjectState = 1 + ProjectState_PROJECTSSTATE_INACTIVE ProjectState = 2 +) + +var ProjectState_name = map[int32]string{ + 0: "PROJECTSTATE_UNSPECIFIED", + 1: "PROJECTSTATE_ACTIVE", + 2: "PROJECTSSTATE_INACTIVE", +} + +var ProjectState_value = map[string]int32{ + "PROJECTSTATE_UNSPECIFIED": 0, + "PROJECTSTATE_ACTIVE": 1, + "PROJECTSSTATE_INACTIVE": 2, +} + +func (x ProjectState) String() string { + return proto.EnumName(ProjectState_name, int32(x)) +} + +func (ProjectState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +type ProjectType int32 + +const ( + ProjectType_PROJECTTYPE_UNKNOWN ProjectType = 0 + ProjectType_PROJECTTYPE_SELF ProjectType = 1 + ProjectType_PROJECTTYPE_GRANTED ProjectType = 2 +) + +var ProjectType_name = map[int32]string{ + 0: "PROJECTTYPE_UNKNOWN", + 1: "PROJECTTYPE_SELF", + 2: "PROJECTTYPE_GRANTED", +} + +var ProjectType_value = map[string]int32{ + "PROJECTTYPE_UNKNOWN": 0, + "PROJECTTYPE_SELF": 1, + "PROJECTTYPE_GRANTED": 2, +} + +func (x ProjectType) String() string { + return proto.EnumName(ProjectType_name, int32(x)) +} + +func (ProjectType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +type ProjectSearchKey int32 + +const ( + ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED ProjectSearchKey = 0 + ProjectSearchKey_PROJECTSEARCHKEY_PROJECT_NAME ProjectSearchKey = 1 +) + +var ProjectSearchKey_name = map[int32]string{ + 0: "PROJECTSEARCHKEY_UNSPECIFIED", + 1: "PROJECTSEARCHKEY_PROJECT_NAME", +} + +var ProjectSearchKey_value = map[string]int32{ + "PROJECTSEARCHKEY_UNSPECIFIED": 0, + "PROJECTSEARCHKEY_PROJECT_NAME": 1, +} + +func (x ProjectSearchKey) String() string { + return proto.EnumName(ProjectSearchKey_name, int32(x)) +} + +func (ProjectSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +type ProjectRoleSearchKey int32 + +const ( + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED ProjectRoleSearchKey = 0 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_NAME ProjectRoleSearchKey = 1 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_DISPLAY_NAME ProjectRoleSearchKey = 2 +) + +var ProjectRoleSearchKey_name = map[int32]string{ + 0: "PROJECTROLESEARCHKEY_UNSPECIFIED", + 1: "PROJECTROLESEARCHKEY_NAME", + 2: "PROJECTROLESEARCHKEY_DISPLAY_NAME", +} + +var ProjectRoleSearchKey_value = map[string]int32{ + "PROJECTROLESEARCHKEY_UNSPECIFIED": 0, + "PROJECTROLESEARCHKEY_NAME": 1, + "PROJECTROLESEARCHKEY_DISPLAY_NAME": 2, +} + +func (x ProjectRoleSearchKey) String() string { + return proto.EnumName(ProjectRoleSearchKey_name, int32(x)) +} + +func (ProjectRoleSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +type ProjectMemberSearchKey int32 + +const ( + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED ProjectMemberSearchKey = 0 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_FIRST_NAME ProjectMemberSearchKey = 1 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_LAST_NAME ProjectMemberSearchKey = 2 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_EMAIL ProjectMemberSearchKey = 3 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_USER_ID ProjectMemberSearchKey = 4 +) + +var ProjectMemberSearchKey_name = map[int32]string{ + 0: "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectMemberSearchKey_value = map[string]int32{ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectMemberSearchKey) String() string { + return proto.EnumName(ProjectMemberSearchKey_name, int32(x)) +} + +func (ProjectMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +type AppState int32 + +const ( + AppState_APPSTATE_UNSPECIFIED AppState = 0 + AppState_APPSTATE_ACTIVE AppState = 1 + AppState_APPSTATE_INACTIVE AppState = 2 +) + +var AppState_name = map[int32]string{ + 0: "APPSTATE_UNSPECIFIED", + 1: "APPSTATE_ACTIVE", + 2: "APPSTATE_INACTIVE", +} + +var AppState_value = map[string]int32{ + "APPSTATE_UNSPECIFIED": 0, + "APPSTATE_ACTIVE": 1, + "APPSTATE_INACTIVE": 2, +} + +func (x AppState) String() string { + return proto.EnumName(AppState_name, int32(x)) +} + +func (AppState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_TOKEN_ID_TOKEN OIDCResponseType = 2 +) + +var OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_TOKEN_ID_TOKEN", +} + +var OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN": 2, +} + +func (x OIDCResponseType) String() string { + return proto.EnumName(OIDCResponseType_name, int32(x)) +} + +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +type OIDCGrantType int32 + +const ( + OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 + OIDCGrantType_OIDCGRANTTYPE_IMPLICIT OIDCGrantType = 1 + OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +) + +var OIDCGrantType_name = map[int32]string{ + 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", + 1: "OIDCGRANTTYPE_IMPLICIT", + 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +} + +var OIDCGrantType_value = map[string]int32{ + "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, + "OIDCGRANTTYPE_IMPLICIT": 1, + "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +} + +func (x OIDCGrantType) String() string { + return proto.EnumName(OIDCGrantType_name, int32(x)) +} + +func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +type OIDCApplicationType int32 + +const ( + OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 + OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 + OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 +) + +var OIDCApplicationType_name = map[int32]string{ + 0: "OIDCAPPLICATIONTYPE_WEB", + 1: "OIDCAPPLICATIONTYPE_USER_AGENT", + 2: "OIDCAPPLICATIONTYPE_NATIVE", +} + +var OIDCApplicationType_value = map[string]int32{ + "OIDCAPPLICATIONTYPE_WEB": 0, + "OIDCAPPLICATIONTYPE_USER_AGENT": 1, + "OIDCAPPLICATIONTYPE_NATIVE": 2, +} + +func (x OIDCApplicationType) String() string { + return proto.EnumName(OIDCApplicationType_name, int32(x)) +} + +func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +type OIDCAuthMethodType int32 + +const ( + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 +) + +var OIDCAuthMethodType_name = map[int32]string{ + 0: "OIDCAUTHMETHODTYPE_BASIC", + 1: "OIDCAUTHMETHODTYPE_POST", + 2: "OIDCAUTHMETHODTYPE_NONE", +} + +var OIDCAuthMethodType_value = map[string]int32{ + "OIDCAUTHMETHODTYPE_BASIC": 0, + "OIDCAUTHMETHODTYPE_POST": 1, + "OIDCAUTHMETHODTYPE_NONE": 2, +} + +func (x OIDCAuthMethodType) String() string { + return proto.EnumName(OIDCAuthMethodType_name, int32(x)) +} + +func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +type ApplicationSearchKey int32 + +const ( + ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED ApplicationSearchKey = 0 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 1 +) + +var ApplicationSearchKey_name = map[int32]string{ + 0: "APPLICATIONSERACHKEY_UNSPECIFIED", + 1: "APPLICATIONSEARCHKEY_APP_NAME", +} + +var ApplicationSearchKey_value = map[string]int32{ + "APPLICATIONSERACHKEY_UNSPECIFIED": 0, + "APPLICATIONSEARCHKEY_APP_NAME": 1, +} + +func (x ApplicationSearchKey) String() string { + return proto.EnumName(ApplicationSearchKey_name, int32(x)) +} + +func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +type ProjectGrantState int32 + +const ( + ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED ProjectGrantState = 0 + ProjectGrantState_PROJECTGRANTSTATE_ACTIVE ProjectGrantState = 1 + ProjectGrantState_PROJECTGRANTSTATE_INACTIVE ProjectGrantState = 2 +) + +var ProjectGrantState_name = map[int32]string{ + 0: "PROJECTGRANTSTATE_UNSPECIFIED", + 1: "PROJECTGRANTSTATE_ACTIVE", + 2: "PROJECTGRANTSTATE_INACTIVE", +} + +var ProjectGrantState_value = map[string]int32{ + "PROJECTGRANTSTATE_UNSPECIFIED": 0, + "PROJECTGRANTSTATE_ACTIVE": 1, + "PROJECTGRANTSTATE_INACTIVE": 2, +} + +func (x ProjectGrantState) String() string { + return proto.EnumName(ProjectGrantState_name, int32(x)) +} + +func (ProjectGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +type ProjectGrantMemberSearchKey int32 + +const ( + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED ProjectGrantMemberSearchKey = 0 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME ProjectGrantMemberSearchKey = 1 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME ProjectGrantMemberSearchKey = 2 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_EMAIL ProjectGrantMemberSearchKey = 3 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_USER_ID ProjectGrantMemberSearchKey = 4 +) + +var ProjectGrantMemberSearchKey_name = map[int32]string{ + 0: "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTGRANTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectGrantMemberSearchKey_value = map[string]int32{ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectGrantMemberSearchKey) String() string { + return proto.EnumName(ProjectGrantMemberSearchKey_name, int32(x)) +} + +func (ProjectGrantMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +type UserGrantState int32 + +const ( + UserGrantState_USERGRANTSTATE_UNSPECIFIED UserGrantState = 0 + UserGrantState_USERGRANTSTATE_ACTIVE UserGrantState = 1 + UserGrantState_USERGRANTSTATE_INACTIVE UserGrantState = 2 +) + +var UserGrantState_name = map[int32]string{ + 0: "USERGRANTSTATE_UNSPECIFIED", + 1: "USERGRANTSTATE_ACTIVE", + 2: "USERGRANTSTATE_INACTIVE", +} + +var UserGrantState_value = map[string]int32{ + "USERGRANTSTATE_UNSPECIFIED": 0, + "USERGRANTSTATE_ACTIVE": 1, + "USERGRANTSTATE_INACTIVE": 2, +} + +func (x UserGrantState) String() string { + return proto.EnumName(UserGrantState_name, int32(x)) +} + +func (UserGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +type UserGrantSearchKey int32 + +const ( + UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED UserGrantSearchKey = 0 + UserGrantSearchKey_USERGRANTSEARCHKEY_PROJECT_ID UserGrantSearchKey = 1 + UserGrantSearchKey_USERGRANTSEARCHKEY_USER_ID UserGrantSearchKey = 2 + UserGrantSearchKey_USERGRANTSEARCHKEY_ORG_ID UserGrantSearchKey = 3 +) + +var UserGrantSearchKey_name = map[int32]string{ + 0: "USERGRANTSEARCHKEY_UNSPECIFIED", + 1: "USERGRANTSEARCHKEY_PROJECT_ID", + 2: "USERGRANTSEARCHKEY_USER_ID", + 3: "USERGRANTSEARCHKEY_ORG_ID", +} + +var UserGrantSearchKey_value = map[string]int32{ + "USERGRANTSEARCHKEY_UNSPECIFIED": 0, + "USERGRANTSEARCHKEY_PROJECT_ID": 1, + "USERGRANTSEARCHKEY_USER_ID": 2, + "USERGRANTSEARCHKEY_ORG_ID": 3, +} + +func (x UserGrantSearchKey) String() string { + return proto.EnumName(UserGrantSearchKey_name, int32(x)) +} + +func (UserGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +type AuthGrantSearchKey int32 + +const ( + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED AuthGrantSearchKey = 0 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_ORG_ID AuthGrantSearchKey = 1 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_PROJECT_ID AuthGrantSearchKey = 2 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_USER_ID AuthGrantSearchKey = 3 +) + +var AuthGrantSearchKey_name = map[int32]string{ + 0: "AUTHGRANTSEARCHKEY_UNSPECIFIED", + 1: "AUTHGRANTSEARCHKEY_ORG_ID", + 2: "AUTHGRANTSEARCHKEY_PROJECT_ID", + 3: "AUTHGRANTSEARCHKEY_USER_ID", +} + +var AuthGrantSearchKey_value = map[string]int32{ + "AUTHGRANTSEARCHKEY_UNSPECIFIED": 0, + "AUTHGRANTSEARCHKEY_ORG_ID": 1, + "AUTHGRANTSEARCHKEY_PROJECT_ID": 2, + "AUTHGRANTSEARCHKEY_USER_ID": 3, +} + +func (x AuthGrantSearchKey) String() string { + return proto.EnumName(AuthGrantSearchKey_name, int32(x)) +} + +func (AuthGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +type ChangeRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SequenceOffset uint64 `protobuf:"varint,3,opt,name=sequence_offset,json=sequenceOffset,proto3" json:"sequence_offset,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeRequest) Reset() { *m = ChangeRequest{} } +func (m *ChangeRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeRequest) ProtoMessage() {} +func (*ChangeRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +func (m *ChangeRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeRequest.Unmarshal(m, b) +} +func (m *ChangeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeRequest.Marshal(b, m, deterministic) +} +func (m *ChangeRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeRequest.Merge(m, src) +} +func (m *ChangeRequest) XXX_Size() int { + return xxx_messageInfo_ChangeRequest.Size(m) +} +func (m *ChangeRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeRequest proto.InternalMessageInfo + +func (m *ChangeRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ChangeRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ChangeRequest) GetSequenceOffset() uint64 { + if m != nil { + return m.SequenceOffset + } + return 0 +} + +type Changes struct { + Changes []*Change `protobuf:"bytes,1,rep,name=changes,proto3" json:"changes,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Changes) Reset() { *m = Changes{} } +func (m *Changes) String() string { return proto.CompactTextString(m) } +func (*Changes) ProtoMessage() {} +func (*Changes) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +func (m *Changes) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Changes.Unmarshal(m, b) +} +func (m *Changes) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Changes.Marshal(b, m, deterministic) +} +func (m *Changes) XXX_Merge(src proto.Message) { + xxx_messageInfo_Changes.Merge(m, src) +} +func (m *Changes) XXX_Size() int { + return xxx_messageInfo_Changes.Size(m) +} +func (m *Changes) XXX_DiscardUnknown() { + xxx_messageInfo_Changes.DiscardUnknown(m) +} + +var xxx_messageInfo_Changes proto.InternalMessageInfo + +func (m *Changes) GetChanges() []*Change { + if m != nil { + return m.Changes + } + return nil +} + +func (m *Changes) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *Changes) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type Change struct { + ChangeDate *timestamp.Timestamp `protobuf:"bytes,1,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + EventType string `protobuf:"bytes,2,opt,name=event_type,json=eventType,proto3" json:"event_type,omitempty"` + Sequence uint64 `protobuf:"varint,3,opt,name=sequence,proto3" json:"sequence,omitempty"` + Modifier string `protobuf:"bytes,4,opt,name=modifier,proto3" json:"modifier,omitempty"` + Data *_struct.Struct `protobuf:"bytes,5,opt,name=data,proto3" json:"data,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Change) Reset() { *m = Change{} } +func (m *Change) String() string { return proto.CompactTextString(m) } +func (*Change) ProtoMessage() {} +func (*Change) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +func (m *Change) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Change.Unmarshal(m, b) +} +func (m *Change) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Change.Marshal(b, m, deterministic) +} +func (m *Change) XXX_Merge(src proto.Message) { + xxx_messageInfo_Change.Merge(m, src) +} +func (m *Change) XXX_Size() int { + return xxx_messageInfo_Change.Size(m) +} +func (m *Change) XXX_DiscardUnknown() { + xxx_messageInfo_Change.DiscardUnknown(m) +} + +var xxx_messageInfo_Change proto.InternalMessageInfo + +func (m *Change) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Change) GetEventType() string { + if m != nil { + return m.EventType + } + return "" +} + +func (m *Change) GetSequence() uint64 { + if m != nil { + return m.Sequence + } + return 0 +} + +func (m *Change) GetModifier() string { + if m != nil { + return m.Modifier + } + return "" +} + +func (m *Change) GetData() *_struct.Struct { + if m != nil { + return m.Data + } + return nil +} + +type ApplicationID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationID) Reset() { *m = ApplicationID{} } +func (m *ApplicationID) String() string { return proto.CompactTextString(m) } +func (*ApplicationID) ProtoMessage() {} +func (*ApplicationID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +func (m *ApplicationID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationID.Unmarshal(m, b) +} +func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) +} +func (m *ApplicationID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationID.Merge(m, src) +} +func (m *ApplicationID) XXX_Size() int { + return xxx_messageInfo_ApplicationID.Size(m) +} +func (m *ApplicationID) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationID.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationID proto.InternalMessageInfo + +func (m *ApplicationID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +type ProjectID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectID) Reset() { *m = ProjectID{} } +func (m *ProjectID) String() string { return proto.CompactTextString(m) } +func (*ProjectID) ProtoMessage() {} +func (*ProjectID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +func (m *ProjectID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectID.Unmarshal(m, b) +} +func (m *ProjectID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectID.Marshal(b, m, deterministic) +} +func (m *ProjectID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectID.Merge(m, src) +} +func (m *ProjectID) XXX_Size() int { + return xxx_messageInfo_ProjectID.Size(m) +} +func (m *ProjectID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectID proto.InternalMessageInfo + +func (m *ProjectID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserID) Reset() { *m = UserID{} } +func (m *UserID) String() string { return proto.CompactTextString(m) } +func (*UserID) ProtoMessage() {} +func (*UserID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +func (m *UserID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserID.Unmarshal(m, b) +} +func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserID.Marshal(b, m, deterministic) +} +func (m *UserID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserID.Merge(m, src) +} +func (m *UserID) XXX_Size() int { + return xxx_messageInfo_UserID.Size(m) +} +func (m *UserID) XXX_DiscardUnknown() { + xxx_messageInfo_UserID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserID proto.InternalMessageInfo + +func (m *UserID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserEmailID struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmailID) Reset() { *m = UserEmailID{} } +func (m *UserEmailID) String() string { return proto.CompactTextString(m) } +func (*UserEmailID) ProtoMessage() {} +func (*UserEmailID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +func (m *UserEmailID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmailID.Unmarshal(m, b) +} +func (m *UserEmailID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmailID.Marshal(b, m, deterministic) +} +func (m *UserEmailID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmailID.Merge(m, src) +} +func (m *UserEmailID) XXX_Size() int { + return xxx_messageInfo_UserEmailID.Size(m) +} +func (m *UserEmailID) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmailID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmailID proto.InternalMessageInfo + +func (m *UserEmailID) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } +func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueUserRequest) ProtoMessage() {} +func (*UniqueUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) +} +func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) +} +func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserRequest.Merge(m, src) +} +func (m *UniqueUserRequest) XXX_Size() int { + return xxx_messageInfo_UniqueUserRequest.Size(m) +} +func (m *UniqueUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo + +func (m *UniqueUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UniqueUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } +func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueUserResponse) ProtoMessage() {} +func (*UniqueUserResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) +} +func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) +} +func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserResponse.Merge(m, src) +} +func (m *UniqueUserResponse) XXX_Size() int { + return xxx_messageInfo_UniqueUserResponse.Size(m) +} +func (m *UniqueUserResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo + +func (m *UniqueUserResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type CreateUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,8,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,9,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,11,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,12,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,13,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,14,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,15,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,16,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,17,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + Password string `protobuf:"bytes,18,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateUserRequest) Reset() { *m = CreateUserRequest{} } +func (m *CreateUserRequest) String() string { return proto.CompactTextString(m) } +func (*CreateUserRequest) ProtoMessage() {} +func (*CreateUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +func (m *CreateUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateUserRequest.Unmarshal(m, b) +} +func (m *CreateUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateUserRequest.Marshal(b, m, deterministic) +} +func (m *CreateUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateUserRequest.Merge(m, src) +} +func (m *CreateUserRequest) XXX_Size() int { + return xxx_messageInfo_CreateUserRequest.Size(m) +} +func (m *CreateUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateUserRequest proto.InternalMessageInfo + +func (m *CreateUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *CreateUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *CreateUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *CreateUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *CreateUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *CreateUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *CreateUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *CreateUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *CreateUserRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *CreateUserRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *CreateUserRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *CreateUserRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *CreateUserRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *CreateUserRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *CreateUserRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *CreateUserRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +func (m *CreateUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,5,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,6,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,7,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,8,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,9,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + DisplayName string `protobuf:"bytes,10,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,12,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,13,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,14,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,15,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,16,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,17,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,18,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,19,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,20,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,21,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,22,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetLastLogin() *timestamp.Timestamp { + if m != nil { + return m.LastLogin + } + return nil +} + +func (m *User) GetPasswordChanged() *timestamp.Timestamp { + if m != nil { + return m.PasswordChanged + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UserSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn UserSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*UserSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchRequest) Reset() { *m = UserSearchRequest{} } +func (m *UserSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserSearchRequest) ProtoMessage() {} +func (*UserSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +func (m *UserSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchRequest.Unmarshal(m, b) +} +func (m *UserSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchRequest.Merge(m, src) +} +func (m *UserSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserSearchRequest.Size(m) +} +func (m *UserSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchRequest proto.InternalMessageInfo + +func (m *UserSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchRequest) GetSortingColumn() UserSearchKey { + if m != nil { + return m.SortingColumn + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *UserSearchRequest) GetQueries() []*UserSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserSearchQuery struct { + Key UserSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchQuery) Reset() { *m = UserSearchQuery{} } +func (m *UserSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserSearchQuery) ProtoMessage() {} +func (*UserSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +func (m *UserSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchQuery.Unmarshal(m, b) +} +func (m *UserSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchQuery.Merge(m, src) +} +func (m *UserSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserSearchQuery.Size(m) +} +func (m *UserSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchQuery proto.InternalMessageInfo + +func (m *UserSearchQuery) GetKey() UserSearchKey { + if m != nil { + return m.Key + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*User `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchResponse) Reset() { *m = UserSearchResponse{} } +func (m *UserSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserSearchResponse) ProtoMessage() {} +func (*UserSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +func (m *UserSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchResponse.Unmarshal(m, b) +} +func (m *UserSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchResponse.Merge(m, src) +} +func (m *UserSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserSearchResponse.Size(m) +} +func (m *UserSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchResponse proto.InternalMessageInfo + +func (m *UserSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserSearchResponse) GetResult() []*User { + if m != nil { + return m.Result + } + return nil +} + +type UserProfile struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserProfile) Reset() { *m = UserProfile{} } +func (m *UserProfile) String() string { return proto.CompactTextString(m) } +func (*UserProfile) ProtoMessage() {} +func (*UserProfile) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +func (m *UserProfile) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserProfile.Unmarshal(m, b) +} +func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) +} +func (m *UserProfile) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserProfile.Merge(m, src) +} +func (m *UserProfile) XXX_Size() int { + return xxx_messageInfo_UserProfile.Size(m) +} +func (m *UserProfile) XXX_DiscardUnknown() { + xxx_messageInfo_UserProfile.DiscardUnknown(m) +} + +var xxx_messageInfo_UserProfile proto.InternalMessageInfo + +func (m *UserProfile) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserProfile) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *UserProfile) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserProfile) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserProfile) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UserProfile) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UserProfile) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UserProfile) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *UserProfile) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type UpdateUserProfileRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } +func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserProfileRequest) ProtoMessage() {} +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) +} +func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) +} +func (m *UpdateUserProfileRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserProfileRequest.Size(m) +} +func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo + +func (m *UpdateUserProfileRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserProfileRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UpdateUserProfileRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmail) Reset() { *m = UserEmail{} } +func (m *UserEmail) String() string { return proto.CompactTextString(m) } +func (*UserEmail) ProtoMessage() {} +func (*UserEmail) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +func (m *UserEmail) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmail.Unmarshal(m, b) +} +func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) +} +func (m *UserEmail) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmail.Merge(m, src) +} +func (m *UserEmail) XXX_Size() int { + return xxx_messageInfo_UserEmail.Size(m) +} +func (m *UserEmail) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmail.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmail proto.InternalMessageInfo + +func (m *UserEmail) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserEmail) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserEmail) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UpdateUserEmailRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } +func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserEmailRequest) ProtoMessage() {} +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) +} +func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) +} +func (m *UpdateUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserEmailRequest.Size(m) +} +func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo + +func (m *UpdateUserEmailRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserEmailRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UpdateUserEmailRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UserPhone struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserPhone) Reset() { *m = UserPhone{} } +func (m *UserPhone) String() string { return proto.CompactTextString(m) } +func (*UserPhone) ProtoMessage() {} +func (*UserPhone) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +func (m *UserPhone) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserPhone.Unmarshal(m, b) +} +func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) +} +func (m *UserPhone) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserPhone.Merge(m, src) +} +func (m *UserPhone) XXX_Size() int { + return xxx_messageInfo_UserPhone.Size(m) +} +func (m *UserPhone) XXX_DiscardUnknown() { + xxx_messageInfo_UserPhone.DiscardUnknown(m) +} + +var xxx_messageInfo_UserPhone proto.InternalMessageInfo + +func (m *UserPhone) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserPhone) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UserPhone) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } +func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) +} +func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) +} +func (m *UpdateUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) +} +func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo + +func (m *UpdateUserPhoneRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UserAddress struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAddress) Reset() { *m = UserAddress{} } +func (m *UserAddress) String() string { return proto.CompactTextString(m) } +func (*UserAddress) ProtoMessage() {} +func (*UserAddress) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +func (m *UserAddress) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAddress.Unmarshal(m, b) +} +func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) +} +func (m *UserAddress) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAddress.Merge(m, src) +} +func (m *UserAddress) XXX_Size() int { + return xxx_messageInfo_UserAddress.Size(m) +} +func (m *UserAddress) XXX_DiscardUnknown() { + xxx_messageInfo_UserAddress.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAddress proto.InternalMessageInfo + +func (m *UserAddress) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAddress) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UserAddress) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UserAddress) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UserAddress) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UserAddress) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } +func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserAddressRequest) ProtoMessage() {} +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) +} +func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) +} +func (m *UpdateUserAddressRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserAddressRequest.Size(m) +} +func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo + +func (m *UpdateUserAddressRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserAddressRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UpdateUserAddressRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UpdateUserAddressRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UpdateUserAddressRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UpdateUserAddressRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type MultiFactors struct { + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactors) Reset() { *m = MultiFactors{} } +func (m *MultiFactors) String() string { return proto.CompactTextString(m) } +func (*MultiFactors) ProtoMessage() {} +func (*MultiFactors) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +func (m *MultiFactors) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactors.Unmarshal(m, b) +} +func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) +} +func (m *MultiFactors) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactors.Merge(m, src) +} +func (m *MultiFactors) XXX_Size() int { + return xxx_messageInfo_MultiFactors.Size(m) +} +func (m *MultiFactors) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactors.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactors proto.InternalMessageInfo + +func (m *MultiFactors) GetMfas() []*MultiFactor { + if m != nil { + return m.Mfas + } + return nil +} + +type MultiFactor struct { + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactor) Reset() { *m = MultiFactor{} } +func (m *MultiFactor) String() string { return proto.CompactTextString(m) } +func (*MultiFactor) ProtoMessage() {} +func (*MultiFactor) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +func (m *MultiFactor) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactor.Unmarshal(m, b) +} +func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) +} +func (m *MultiFactor) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactor.Merge(m, src) +} +func (m *MultiFactor) XXX_Size() int { + return xxx_messageInfo_MultiFactor.Size(m) +} +func (m *MultiFactor) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactor.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactor proto.InternalMessageInfo + +func (m *MultiFactor) GetType() MfaType { + if m != nil { + return m.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *MultiFactor) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type PasswordID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordID) Reset() { *m = PasswordID{} } +func (m *PasswordID) String() string { return proto.CompactTextString(m) } +func (*PasswordID) ProtoMessage() {} +func (*PasswordID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +func (m *PasswordID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordID.Unmarshal(m, b) +} +func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) +} +func (m *PasswordID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordID.Merge(m, src) +} +func (m *PasswordID) XXX_Size() int { + return xxx_messageInfo_PasswordID.Size(m) +} +func (m *PasswordID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordID proto.InternalMessageInfo + +func (m *PasswordID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Password string `protobuf:"bytes,2,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } +func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } +func (*PasswordRequest) ProtoMessage() {} +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) +} +func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) +} +func (m *PasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordRequest.Merge(m, src) +} +func (m *PasswordRequest) XXX_Size() int { + return xxx_messageInfo_PasswordRequest.Size(m) +} +func (m *PasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo + +func (m *PasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type ResetPasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } +func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*ResetPasswordRequest) ProtoMessage() {} +func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{26} +} + +func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) +} +func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) +} +func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPasswordRequest.Merge(m, src) +} +func (m *ResetPasswordRequest) XXX_Size() int { + return xxx_messageInfo_ResetPasswordRequest.Size(m) +} +func (m *ResetPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo + +func (m *ResetPasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type SetPasswordNotificationRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } +func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } +func (*SetPasswordNotificationRequest) ProtoMessage() {} +func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{27} +} + +func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) +} +func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) +} +func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) +} +func (m *SetPasswordNotificationRequest) XXX_Size() int { + return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) +} +func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo + +func (m *SetPasswordNotificationRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *SetPasswordNotificationRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type PasswordComplexityPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyID) Reset() { *m = PasswordComplexityPolicyID{} } +func (m *PasswordComplexityPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyID) ProtoMessage() {} +func (*PasswordComplexityPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{28} +} + +func (m *PasswordComplexityPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyID.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyID.Merge(m, src) +} +func (m *PasswordComplexityPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyID.Size(m) +} +func (m *PasswordComplexityPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyID proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordComplexityPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MinLength uint64 `protobuf:"varint,6,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,7,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,8,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,9,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,10,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicy) Reset() { *m = PasswordComplexityPolicy{} } +func (m *PasswordComplexityPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicy) ProtoMessage() {} +func (*PasswordComplexityPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{29} +} + +func (m *PasswordComplexityPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicy.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicy.Merge(m, src) +} +func (m *PasswordComplexityPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicy.Size(m) +} +func (m *PasswordComplexityPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicy proto.InternalMessageInfo + +func (m *PasswordComplexityPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordComplexityPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicy) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,2,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,3,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,4,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,5,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,6,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyCreate) Reset() { *m = PasswordComplexityPolicyCreate{} } +func (m *PasswordComplexityPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyCreate) ProtoMessage() {} +func (*PasswordComplexityPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{30} +} + +func (m *PasswordComplexityPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyCreate.Merge(m, src) +} +func (m *PasswordComplexityPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Size(m) +} +func (m *PasswordComplexityPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyCreate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyCreate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyCreate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,3,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,4,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,5,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,6,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,7,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyUpdate) Reset() { *m = PasswordComplexityPolicyUpdate{} } +func (m *PasswordComplexityPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyUpdate) ProtoMessage() {} +func (*PasswordComplexityPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{31} +} + +func (m *PasswordComplexityPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyUpdate.Merge(m, src) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Size(m) +} +func (m *PasswordComplexityPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyUpdate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordAgePolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyID) Reset() { *m = PasswordAgePolicyID{} } +func (m *PasswordAgePolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyID) ProtoMessage() {} +func (*PasswordAgePolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{32} +} + +func (m *PasswordAgePolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyID.Unmarshal(m, b) +} +func (m *PasswordAgePolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyID.Merge(m, src) +} +func (m *PasswordAgePolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyID.Size(m) +} +func (m *PasswordAgePolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyID proto.InternalMessageInfo + +func (m *PasswordAgePolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordAgePolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,6,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,7,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicy) Reset() { *m = PasswordAgePolicy{} } +func (m *PasswordAgePolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicy) ProtoMessage() {} +func (*PasswordAgePolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{33} +} + +func (m *PasswordAgePolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicy.Unmarshal(m, b) +} +func (m *PasswordAgePolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicy.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicy.Merge(m, src) +} +func (m *PasswordAgePolicy) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicy.Size(m) +} +func (m *PasswordAgePolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicy proto.InternalMessageInfo + +func (m *PasswordAgePolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordAgePolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordAgePolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordAgePolicy) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicy) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,2,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,3,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyCreate) Reset() { *m = PasswordAgePolicyCreate{} } +func (m *PasswordAgePolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyCreate) ProtoMessage() {} +func (*PasswordAgePolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{34} +} + +func (m *PasswordAgePolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyCreate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyCreate.Merge(m, src) +} +func (m *PasswordAgePolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyCreate.Size(m) +} +func (m *PasswordAgePolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyCreate proto.InternalMessageInfo + +func (m *PasswordAgePolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyCreate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyCreate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,3,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,4,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyUpdate) Reset() { *m = PasswordAgePolicyUpdate{} } +func (m *PasswordAgePolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyUpdate) ProtoMessage() {} +func (*PasswordAgePolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{35} +} + +func (m *PasswordAgePolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyUpdate.Merge(m, src) +} +func (m *PasswordAgePolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyUpdate.Size(m) +} +func (m *PasswordAgePolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyUpdate proto.InternalMessageInfo + +func (m *PasswordAgePolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyUpdate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordLockoutPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyID) Reset() { *m = PasswordLockoutPolicyID{} } +func (m *PasswordLockoutPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyID) ProtoMessage() {} +func (*PasswordLockoutPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{36} +} + +func (m *PasswordLockoutPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyID.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyID.Merge(m, src) +} +func (m *PasswordLockoutPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyID.Size(m) +} +func (m *PasswordLockoutPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyID proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordLockoutPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAttempts uint64 `protobuf:"varint,6,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,7,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicy) Reset() { *m = PasswordLockoutPolicy{} } +func (m *PasswordLockoutPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicy) ProtoMessage() {} +func (*PasswordLockoutPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{37} +} + +func (m *PasswordLockoutPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicy.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicy.Merge(m, src) +} +func (m *PasswordLockoutPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicy.Size(m) +} +func (m *PasswordLockoutPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicy proto.InternalMessageInfo + +func (m *PasswordLockoutPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordLockoutPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicy) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,2,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,3,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyCreate) Reset() { *m = PasswordLockoutPolicyCreate{} } +func (m *PasswordLockoutPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyCreate) ProtoMessage() {} +func (*PasswordLockoutPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{38} +} + +func (m *PasswordLockoutPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyCreate.Merge(m, src) +} +func (m *PasswordLockoutPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Size(m) +} +func (m *PasswordLockoutPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyCreate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyCreate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyCreate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,3,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,4,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyUpdate) Reset() { *m = PasswordLockoutPolicyUpdate{} } +func (m *PasswordLockoutPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyUpdate) ProtoMessage() {} +func (*PasswordLockoutPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{39} +} + +func (m *PasswordLockoutPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyUpdate.Merge(m, src) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Size(m) +} +func (m *PasswordLockoutPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyUpdate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{40} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type OrgDomain struct { + Domain string `protobuf:"bytes,1,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgDomain) Reset() { *m = OrgDomain{} } +func (m *OrgDomain) String() string { return proto.CompactTextString(m) } +func (*OrgDomain) ProtoMessage() {} +func (*OrgDomain) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{41} +} + +func (m *OrgDomain) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgDomain.Unmarshal(m, b) +} +func (m *OrgDomain) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgDomain.Marshal(b, m, deterministic) +} +func (m *OrgDomain) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgDomain.Merge(m, src) +} +func (m *OrgDomain) XXX_Size() int { + return xxx_messageInfo_OrgDomain.Size(m) +} +func (m *OrgDomain) XXX_DiscardUnknown() { + xxx_messageInfo_OrgDomain.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgDomain proto.InternalMessageInfo + +func (m *OrgDomain) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{42} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberRoles) Reset() { *m = OrgMemberRoles{} } +func (m *OrgMemberRoles) String() string { return proto.CompactTextString(m) } +func (*OrgMemberRoles) ProtoMessage() {} +func (*OrgMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{43} +} + +func (m *OrgMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberRoles.Unmarshal(m, b) +} +func (m *OrgMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberRoles.Marshal(b, m, deterministic) +} +func (m *OrgMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberRoles.Merge(m, src) +} +func (m *OrgMemberRoles) XXX_Size() int { + return xxx_messageInfo_OrgMemberRoles.Size(m) +} +func (m *OrgMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberRoles proto.InternalMessageInfo + +func (m *OrgMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type OrgMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMember) Reset() { *m = OrgMember{} } +func (m *OrgMember) String() string { return proto.CompactTextString(m) } +func (*OrgMember) ProtoMessage() {} +func (*OrgMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{44} +} + +func (m *OrgMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMember.Unmarshal(m, b) +} +func (m *OrgMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMember.Marshal(b, m, deterministic) +} +func (m *OrgMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMember.Merge(m, src) +} +func (m *OrgMember) XXX_Size() int { + return xxx_messageInfo_OrgMember.Size(m) +} +func (m *OrgMember) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMember.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMember proto.InternalMessageInfo + +func (m *OrgMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *OrgMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *OrgMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *OrgMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *OrgMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *OrgMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *OrgMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *OrgMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type AddOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AddOrgMemberRequest) Reset() { *m = AddOrgMemberRequest{} } +func (m *AddOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*AddOrgMemberRequest) ProtoMessage() {} +func (*AddOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{45} +} + +func (m *AddOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AddOrgMemberRequest.Unmarshal(m, b) +} +func (m *AddOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AddOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *AddOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AddOrgMemberRequest.Merge(m, src) +} +func (m *AddOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_AddOrgMemberRequest.Size(m) +} +func (m *AddOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AddOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AddOrgMemberRequest proto.InternalMessageInfo + +func (m *AddOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AddOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AddOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ChangeOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeOrgMemberRequest) Reset() { *m = ChangeOrgMemberRequest{} } +func (m *ChangeOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeOrgMemberRequest) ProtoMessage() {} +func (*ChangeOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{46} +} + +func (m *ChangeOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeOrgMemberRequest.Unmarshal(m, b) +} +func (m *ChangeOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *ChangeOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeOrgMemberRequest.Merge(m, src) +} +func (m *ChangeOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_ChangeOrgMemberRequest.Size(m) +} +func (m *ChangeOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeOrgMemberRequest proto.InternalMessageInfo + +func (m *ChangeOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type RemoveOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RemoveOrgMemberRequest) Reset() { *m = RemoveOrgMemberRequest{} } +func (m *RemoveOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*RemoveOrgMemberRequest) ProtoMessage() {} +func (*RemoveOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{47} +} + +func (m *RemoveOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RemoveOrgMemberRequest.Unmarshal(m, b) +} +func (m *RemoveOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RemoveOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *RemoveOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RemoveOrgMemberRequest.Merge(m, src) +} +func (m *RemoveOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_RemoveOrgMemberRequest.Size(m) +} +func (m *RemoveOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RemoveOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RemoveOrgMemberRequest proto.InternalMessageInfo + +func (m *RemoveOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *RemoveOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type OrgMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*OrgMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchResponse) Reset() { *m = OrgMemberSearchResponse{} } +func (m *OrgMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchResponse) ProtoMessage() {} +func (*OrgMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{48} +} + +func (m *OrgMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchResponse.Unmarshal(m, b) +} +func (m *OrgMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchResponse.Merge(m, src) +} +func (m *OrgMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchResponse.Size(m) +} +func (m *OrgMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchResponse proto.InternalMessageInfo + +func (m *OrgMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetResult() []*OrgMember { + if m != nil { + return m.Result + } + return nil +} + +type OrgMemberSearchRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*OrgMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchRequest) Reset() { *m = OrgMemberSearchRequest{} } +func (m *OrgMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchRequest) ProtoMessage() {} +func (*OrgMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{49} +} + +func (m *OrgMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchRequest.Unmarshal(m, b) +} +func (m *OrgMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchRequest.Merge(m, src) +} +func (m *OrgMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchRequest.Size(m) +} +func (m *OrgMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchRequest proto.InternalMessageInfo + +func (m *OrgMemberSearchRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *OrgMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetQueries() []*OrgMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgMemberSearchQuery struct { + Key OrgMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.OrgMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchQuery) Reset() { *m = OrgMemberSearchQuery{} } +func (m *OrgMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchQuery) ProtoMessage() {} +func (*OrgMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{50} +} + +func (m *OrgMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchQuery.Unmarshal(m, b) +} +func (m *OrgMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchQuery.Merge(m, src) +} +func (m *OrgMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchQuery.Size(m) +} +func (m *OrgMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchQuery proto.InternalMessageInfo + +func (m *OrgMemberSearchQuery) GetKey() OrgMemberSearchKey { + if m != nil { + return m.Key + } + return OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *OrgMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *OrgMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectCreateRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectCreateRequest) Reset() { *m = ProjectCreateRequest{} } +func (m *ProjectCreateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectCreateRequest) ProtoMessage() {} +func (*ProjectCreateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{51} +} + +func (m *ProjectCreateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectCreateRequest.Unmarshal(m, b) +} +func (m *ProjectCreateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectCreateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectCreateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectCreateRequest.Merge(m, src) +} +func (m *ProjectCreateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectCreateRequest.Size(m) +} +func (m *ProjectCreateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectCreateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectCreateRequest proto.InternalMessageInfo + +func (m *ProjectCreateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectUpdateRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUpdateRequest) Reset() { *m = ProjectUpdateRequest{} } +func (m *ProjectUpdateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUpdateRequest) ProtoMessage() {} +func (*ProjectUpdateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{52} +} + +func (m *ProjectUpdateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUpdateRequest.Unmarshal(m, b) +} +func (m *ProjectUpdateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUpdateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUpdateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUpdateRequest.Merge(m, src) +} +func (m *ProjectUpdateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUpdateRequest.Size(m) +} +func (m *ProjectUpdateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUpdateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUpdateRequest proto.InternalMessageInfo + +func (m *ProjectUpdateRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUpdateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type Projects struct { + Projects []*Project `protobuf:"bytes,1,rep,name=projects,proto3" json:"projects,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Projects) Reset() { *m = Projects{} } +func (m *Projects) String() string { return proto.CompactTextString(m) } +func (*Projects) ProtoMessage() {} +func (*Projects) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{53} +} + +func (m *Projects) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Projects.Unmarshal(m, b) +} +func (m *Projects) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Projects.Marshal(b, m, deterministic) +} +func (m *Projects) XXX_Merge(src proto.Message) { + xxx_messageInfo_Projects.Merge(m, src) +} +func (m *Projects) XXX_Size() int { + return xxx_messageInfo_Projects.Size(m) +} +func (m *Projects) XXX_DiscardUnknown() { + xxx_messageInfo_Projects.DiscardUnknown(m) +} + +var xxx_messageInfo_Projects proto.InternalMessageInfo + +func (m *Projects) GetProjects() []*Project { + if m != nil { + return m.Projects + } + return nil +} + +type Project struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + State ProjectState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectState" json:"state,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Type ProjectType `protobuf:"varint,6,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.ProjectType" json:"type,omitempty"` + ResourceOwner string `protobuf:"bytes,7,opt,name=resource_owner,json=resourceOwner,proto3" json:"resource_owner,omitempty"` + OrgId string `protobuf:"bytes,8,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + OrgName string `protobuf:"bytes,9,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,10,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + GrantId string `protobuf:"bytes,11,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Project) Reset() { *m = Project{} } +func (m *Project) String() string { return proto.CompactTextString(m) } +func (*Project) ProtoMessage() {} +func (*Project) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{54} +} + +func (m *Project) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Project.Unmarshal(m, b) +} +func (m *Project) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Project.Marshal(b, m, deterministic) +} +func (m *Project) XXX_Merge(src proto.Message) { + xxx_messageInfo_Project.Merge(m, src) +} +func (m *Project) XXX_Size() int { + return xxx_messageInfo_Project.Size(m) +} +func (m *Project) XXX_DiscardUnknown() { + xxx_messageInfo_Project.DiscardUnknown(m) +} + +var xxx_messageInfo_Project proto.InternalMessageInfo + +func (m *Project) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Project) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Project) GetState() ProjectState { + if m != nil { + return m.State + } + return ProjectState_PROJECTSTATE_UNSPECIFIED +} + +func (m *Project) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Project) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Project) GetType() ProjectType { + if m != nil { + return m.Type + } + return ProjectType_PROJECTTYPE_UNKNOWN +} + +func (m *Project) GetResourceOwner() string { + if m != nil { + return m.ResourceOwner + } + return "" +} + +func (m *Project) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *Project) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *Project) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *Project) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +type ProjectSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Project `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchResponse) Reset() { *m = ProjectSearchResponse{} } +func (m *ProjectSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchResponse) ProtoMessage() {} +func (*ProjectSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{55} +} + +func (m *ProjectSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchResponse.Unmarshal(m, b) +} +func (m *ProjectSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchResponse.Merge(m, src) +} +func (m *ProjectSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectSearchResponse.Size(m) +} +func (m *ProjectSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchResponse proto.InternalMessageInfo + +func (m *ProjectSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectSearchResponse) GetResult() []*Project { + if m != nil { + return m.Result + } + return nil +} + +type ProjectSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchRequest) Reset() { *m = ProjectSearchRequest{} } +func (m *ProjectSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchRequest) ProtoMessage() {} +func (*ProjectSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{56} +} + +func (m *ProjectSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchRequest.Unmarshal(m, b) +} +func (m *ProjectSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchRequest.Merge(m, src) +} +func (m *ProjectSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectSearchRequest.Size(m) +} +func (m *ProjectSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchRequest proto.InternalMessageInfo + +func (m *ProjectSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchRequest) GetQueries() []*ProjectSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectSearchQuery struct { + Key ProjectSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchQuery) Reset() { *m = ProjectSearchQuery{} } +func (m *ProjectSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchQuery) ProtoMessage() {} +func (*ProjectSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{57} +} + +func (m *ProjectSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchQuery.Unmarshal(m, b) +} +func (m *ProjectSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchQuery.Merge(m, src) +} +func (m *ProjectSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectSearchQuery.Size(m) +} +func (m *ProjectSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchQuery proto.InternalMessageInfo + +func (m *ProjectSearchQuery) GetKey() ProjectSearchKey { + if m != nil { + return m.Key + } + return ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRoles) Reset() { *m = ProjectMemberRoles{} } +func (m *ProjectMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRoles) ProtoMessage() {} +func (*ProjectMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{58} +} + +func (m *ProjectMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRoles.Unmarshal(m, b) +} +func (m *ProjectMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRoles.Merge(m, src) +} +func (m *ProjectMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRoles.Size(m) +} +func (m *ProjectMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRoles proto.InternalMessageInfo + +func (m *ProjectMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMember) Reset() { *m = ProjectMember{} } +func (m *ProjectMember) String() string { return proto.CompactTextString(m) } +func (*ProjectMember) ProtoMessage() {} +func (*ProjectMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{59} +} + +func (m *ProjectMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMember.Unmarshal(m, b) +} +func (m *ProjectMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMember.Marshal(b, m, deterministic) +} +func (m *ProjectMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMember.Merge(m, src) +} +func (m *ProjectMember) XXX_Size() int { + return xxx_messageInfo_ProjectMember.Size(m) +} +func (m *ProjectMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMember proto.InternalMessageInfo + +func (m *ProjectMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectMemberAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberAdd) Reset() { *m = ProjectMemberAdd{} } +func (m *ProjectMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberAdd) ProtoMessage() {} +func (*ProjectMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{60} +} + +func (m *ProjectMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberAdd.Unmarshal(m, b) +} +func (m *ProjectMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberAdd.Merge(m, src) +} +func (m *ProjectMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectMemberAdd.Size(m) +} +func (m *ProjectMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberAdd proto.InternalMessageInfo + +func (m *ProjectMemberAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberChange struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberChange) Reset() { *m = ProjectMemberChange{} } +func (m *ProjectMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberChange) ProtoMessage() {} +func (*ProjectMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{61} +} + +func (m *ProjectMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberChange.Unmarshal(m, b) +} +func (m *ProjectMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberChange.Merge(m, src) +} +func (m *ProjectMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectMemberChange.Size(m) +} +func (m *ProjectMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberChange proto.InternalMessageInfo + +func (m *ProjectMemberChange) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRemove) Reset() { *m = ProjectMemberRemove{} } +func (m *ProjectMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRemove) ProtoMessage() {} +func (*ProjectMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{62} +} + +func (m *ProjectMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRemove.Unmarshal(m, b) +} +func (m *ProjectMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRemove.Merge(m, src) +} +func (m *ProjectMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRemove.Size(m) +} +func (m *ProjectMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRemove proto.InternalMessageInfo + +func (m *ProjectMemberRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectRoleAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + Group string `protobuf:"bytes,4,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleAdd) Reset() { *m = ProjectRoleAdd{} } +func (m *ProjectRoleAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleAdd) ProtoMessage() {} +func (*ProjectRoleAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{63} +} + +func (m *ProjectRoleAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleAdd.Unmarshal(m, b) +} +func (m *ProjectRoleAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleAdd.Marshal(b, m, deterministic) +} +func (m *ProjectRoleAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleAdd.Merge(m, src) +} +func (m *ProjectRoleAdd) XXX_Size() int { + return xxx_messageInfo_ProjectRoleAdd.Size(m) +} +func (m *ProjectRoleAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleAdd proto.InternalMessageInfo + +func (m *ProjectRoleAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleAdd) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRoleAdd) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRoleAdd) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRole struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Group string `protobuf:"bytes,5,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRole) Reset() { *m = ProjectRole{} } +func (m *ProjectRole) String() string { return proto.CompactTextString(m) } +func (*ProjectRole) ProtoMessage() {} +func (*ProjectRole) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{64} +} + +func (m *ProjectRole) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRole.Unmarshal(m, b) +} +func (m *ProjectRole) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRole.Marshal(b, m, deterministic) +} +func (m *ProjectRole) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRole.Merge(m, src) +} +func (m *ProjectRole) XXX_Size() int { + return xxx_messageInfo_ProjectRole.Size(m) +} +func (m *ProjectRole) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRole.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRole proto.InternalMessageInfo + +func (m *ProjectRole) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRole) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRole) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRole) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectRole) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRoleRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleRemove) Reset() { *m = ProjectRoleRemove{} } +func (m *ProjectRoleRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleRemove) ProtoMessage() {} +func (*ProjectRoleRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{65} +} + +func (m *ProjectRoleRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleRemove.Unmarshal(m, b) +} +func (m *ProjectRoleRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleRemove.Marshal(b, m, deterministic) +} +func (m *ProjectRoleRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleRemove.Merge(m, src) +} +func (m *ProjectRoleRemove) XXX_Size() int { + return xxx_messageInfo_ProjectRoleRemove.Size(m) +} +func (m *ProjectRoleRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleRemove proto.InternalMessageInfo + +func (m *ProjectRoleRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleRemove) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectRoleSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectRole `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchResponse) Reset() { *m = ProjectRoleSearchResponse{} } +func (m *ProjectRoleSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchResponse) ProtoMessage() {} +func (*ProjectRoleSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{66} +} + +func (m *ProjectRoleSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchResponse.Unmarshal(m, b) +} +func (m *ProjectRoleSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchResponse.Merge(m, src) +} +func (m *ProjectRoleSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchResponse.Size(m) +} +func (m *ProjectRoleSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchResponse proto.InternalMessageInfo + +func (m *ProjectRoleSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetResult() []*ProjectRole { + if m != nil { + return m.Result + } + return nil +} + +type ProjectRoleSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectRoleSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchRequest) Reset() { *m = ProjectRoleSearchRequest{} } +func (m *ProjectRoleSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchRequest) ProtoMessage() {} +func (*ProjectRoleSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{67} +} + +func (m *ProjectRoleSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchRequest.Unmarshal(m, b) +} +func (m *ProjectRoleSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchRequest.Merge(m, src) +} +func (m *ProjectRoleSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchRequest.Size(m) +} +func (m *ProjectRoleSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchRequest proto.InternalMessageInfo + +func (m *ProjectRoleSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRoleSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetQueries() []*ProjectRoleSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectRoleSearchQuery struct { + Key ProjectRoleSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectRoleSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchQuery) Reset() { *m = ProjectRoleSearchQuery{} } +func (m *ProjectRoleSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchQuery) ProtoMessage() {} +func (*ProjectRoleSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{68} +} + +func (m *ProjectRoleSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchQuery.Unmarshal(m, b) +} +func (m *ProjectRoleSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchQuery.Merge(m, src) +} +func (m *ProjectRoleSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchQuery.Size(m) +} +func (m *ProjectRoleSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchQuery proto.InternalMessageInfo + +func (m *ProjectRoleSearchQuery) GetKey() ProjectRoleSearchKey { + if m != nil { + return m.Key + } + return ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED +} + +func (m *ProjectRoleSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectRoleSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchResponse) Reset() { *m = ProjectMemberSearchResponse{} } +func (m *ProjectMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchResponse) ProtoMessage() {} +func (*ProjectMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{69} +} + +func (m *ProjectMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchResponse.Merge(m, src) +} +func (m *ProjectMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchResponse.Size(m) +} +func (m *ProjectMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetResult() []*ProjectMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchRequest) Reset() { *m = ProjectMemberSearchRequest{} } +func (m *ProjectMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchRequest) ProtoMessage() {} +func (*ProjectMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{70} +} + +func (m *ProjectMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchRequest.Merge(m, src) +} +func (m *ProjectMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchRequest.Size(m) +} +func (m *ProjectMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetQueries() []*ProjectMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectMemberSearchQuery struct { + Key ProjectMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchQuery) Reset() { *m = ProjectMemberSearchQuery{} } +func (m *ProjectMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchQuery) ProtoMessage() {} +func (*ProjectMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{71} +} + +func (m *ProjectMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchQuery.Merge(m, src) +} +func (m *ProjectMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchQuery.Size(m) +} +func (m *ProjectMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectMemberSearchQuery) GetKey() ProjectMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type Application struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.AppState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + // Types that are valid to be assigned to AppConfig: + // *Application_OidcConfig + AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Application) Reset() { *m = Application{} } +func (m *Application) String() string { return proto.CompactTextString(m) } +func (*Application) ProtoMessage() {} +func (*Application) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{72} +} + +func (m *Application) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Application.Unmarshal(m, b) +} +func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Application.Marshal(b, m, deterministic) +} +func (m *Application) XXX_Merge(src proto.Message) { + xxx_messageInfo_Application.Merge(m, src) +} +func (m *Application) XXX_Size() int { + return xxx_messageInfo_Application.Size(m) +} +func (m *Application) XXX_DiscardUnknown() { + xxx_messageInfo_Application.DiscardUnknown(m) +} + +var xxx_messageInfo_Application proto.InternalMessageInfo + +func (m *Application) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Application) GetState() AppState { + if m != nil { + return m.State + } + return AppState_APPSTATE_UNSPECIFIED +} + +func (m *Application) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Application) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Application) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type isApplication_AppConfig interface { + isApplication_AppConfig() +} + +type Application_OidcConfig struct { + OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` +} + +func (*Application_OidcConfig) isApplication_AppConfig() {} + +func (m *Application) GetAppConfig() isApplication_AppConfig { + if m != nil { + return m.AppConfig + } + return nil +} + +func (m *Application) GetOidcConfig() *OIDCConfig { + if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { + return x.OidcConfig + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*Application) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*Application_OidcConfig)(nil), + } +} + +type ApplicationUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationUpdate) Reset() { *m = ApplicationUpdate{} } +func (m *ApplicationUpdate) String() string { return proto.CompactTextString(m) } +func (*ApplicationUpdate) ProtoMessage() {} +func (*ApplicationUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{73} +} + +func (m *ApplicationUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationUpdate.Unmarshal(m, b) +} +func (m *ApplicationUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationUpdate.Marshal(b, m, deterministic) +} +func (m *ApplicationUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationUpdate.Merge(m, src) +} +func (m *ApplicationUpdate) XXX_Size() int { + return xxx_messageInfo_ApplicationUpdate.Size(m) +} +func (m *ApplicationUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationUpdate proto.InternalMessageInfo + +func (m *ApplicationUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationUpdate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type OIDCConfig struct { + RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + ClientId string `protobuf:"bytes,5,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,6,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } +func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } +func (*OIDCConfig) ProtoMessage() {} +func (*OIDCConfig) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{74} +} + +func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) +} +func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) +} +func (m *OIDCConfig) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfig.Merge(m, src) +} +func (m *OIDCConfig) XXX_Size() int { + return xxx_messageInfo_OIDCConfig.Size(m) +} +func (m *OIDCConfig) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfig.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo + +func (m *OIDCConfig) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfig) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCConfig) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCApplicationCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCApplicationCreate) Reset() { *m = OIDCApplicationCreate{} } +func (m *OIDCApplicationCreate) String() string { return proto.CompactTextString(m) } +func (*OIDCApplicationCreate) ProtoMessage() {} +func (*OIDCApplicationCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{75} +} + +func (m *OIDCApplicationCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCApplicationCreate.Unmarshal(m, b) +} +func (m *OIDCApplicationCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCApplicationCreate.Marshal(b, m, deterministic) +} +func (m *OIDCApplicationCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCApplicationCreate.Merge(m, src) +} +func (m *OIDCApplicationCreate) XXX_Size() int { + return xxx_messageInfo_OIDCApplicationCreate.Size(m) +} +func (m *OIDCApplicationCreate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCApplicationCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCApplicationCreate proto.InternalMessageInfo + +func (m *OIDCApplicationCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCApplicationCreate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *OIDCApplicationCreate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCApplicationCreate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCApplicationCreate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCApplicationCreate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCConfigUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + ApplicationId string `protobuf:"bytes,2,opt,name=application_id,json=applicationId,proto3" json:"application_id,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfigUpdate) Reset() { *m = OIDCConfigUpdate{} } +func (m *OIDCConfigUpdate) String() string { return proto.CompactTextString(m) } +func (*OIDCConfigUpdate) ProtoMessage() {} +func (*OIDCConfigUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{76} +} + +func (m *OIDCConfigUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfigUpdate.Unmarshal(m, b) +} +func (m *OIDCConfigUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfigUpdate.Marshal(b, m, deterministic) +} +func (m *OIDCConfigUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfigUpdate.Merge(m, src) +} +func (m *OIDCConfigUpdate) XXX_Size() int { + return xxx_messageInfo_OIDCConfigUpdate.Size(m) +} +func (m *OIDCConfigUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfigUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfigUpdate proto.InternalMessageInfo + +func (m *OIDCConfigUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCConfigUpdate) GetApplicationId() string { + if m != nil { + return m.ApplicationId + } + return "" +} + +func (m *OIDCConfigUpdate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfigUpdate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfigUpdate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfigUpdate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type ClientSecret struct { + ClientSecret string `protobuf:"bytes,1,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ClientSecret) Reset() { *m = ClientSecret{} } +func (m *ClientSecret) String() string { return proto.CompactTextString(m) } +func (*ClientSecret) ProtoMessage() {} +func (*ClientSecret) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{77} +} + +func (m *ClientSecret) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ClientSecret.Unmarshal(m, b) +} +func (m *ClientSecret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ClientSecret.Marshal(b, m, deterministic) +} +func (m *ClientSecret) XXX_Merge(src proto.Message) { + xxx_messageInfo_ClientSecret.Merge(m, src) +} +func (m *ClientSecret) XXX_Size() int { + return xxx_messageInfo_ClientSecret.Size(m) +} +func (m *ClientSecret) XXX_DiscardUnknown() { + xxx_messageInfo_ClientSecret.DiscardUnknown(m) +} + +var xxx_messageInfo_ClientSecret proto.InternalMessageInfo + +func (m *ClientSecret) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +type ApplicationSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } +func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchResponse) ProtoMessage() {} +func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{78} +} + +func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) +} +func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) +} +func (m *ApplicationSearchResponse) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchResponse.Size(m) +} +func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo + +func (m *ApplicationSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ApplicationSearchResponse) GetResult() []*Application { + if m != nil { + return m.Result + } + return nil +} + +type ApplicationSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ApplicationSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } +func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchRequest) ProtoMessage() {} +func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{79} +} + +func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) +} +func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) +} +func (m *ApplicationSearchRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchRequest.Size(m) +} +func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo + +func (m *ApplicationSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ApplicationSearchQuery struct { + Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ApplicationSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } +func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchQuery) ProtoMessage() {} +func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{80} +} + +func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) +} +func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) +} +func (m *ApplicationSearchQuery) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchQuery.Size(m) +} +func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo + +func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { + if m != nil { + return m.Key + } + return ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ApplicationSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,3,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + GrantedOrgName string `protobuf:"bytes,4,opt,name=granted_org_name,json=grantedOrgName,proto3" json:"granted_org_name,omitempty"` + GrantedOrgDomain string `protobuf:"bytes,5,opt,name=granted_org_domain,json=grantedOrgDomain,proto3" json:"granted_org_domain,omitempty"` + RoleNames []string `protobuf:"bytes,6,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State ProjectGrantState `protobuf:"varint,7,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,9,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + ProjectName string `protobuf:"bytes,10,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrant) Reset() { *m = ProjectGrant{} } +func (m *ProjectGrant) String() string { return proto.CompactTextString(m) } +func (*ProjectGrant) ProtoMessage() {} +func (*ProjectGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{81} +} + +func (m *ProjectGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrant.Unmarshal(m, b) +} +func (m *ProjectGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrant.Marshal(b, m, deterministic) +} +func (m *ProjectGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrant.Merge(m, src) +} +func (m *ProjectGrant) XXX_Size() int { + return xxx_messageInfo_ProjectGrant.Size(m) +} +func (m *ProjectGrant) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrant proto.InternalMessageInfo + +func (m *ProjectGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgName() string { + if m != nil { + return m.GrantedOrgName + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgDomain() string { + if m != nil { + return m.GrantedOrgDomain + } + return "" +} + +func (m *ProjectGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *ProjectGrant) GetState() ProjectGrantState { + if m != nil { + return m.State + } + return ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED +} + +func (m *ProjectGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type ProjectGrantCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,2,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantCreate) Reset() { *m = ProjectGrantCreate{} } +func (m *ProjectGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantCreate) ProtoMessage() {} +func (*ProjectGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{82} +} + +func (m *ProjectGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantCreate.Merge(m, src) +} +func (m *ProjectGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantCreate.Size(m) +} +func (m *ProjectGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantCreate) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUpdate) Reset() { *m = ProjectGrantUpdate{} } +func (m *ProjectGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{83} +} + +func (m *ProjectGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUpdate.Size(m) +} +func (m *ProjectGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantID) Reset() { *m = ProjectGrantID{} } +func (m *ProjectGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantID) ProtoMessage() {} +func (*ProjectGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{84} +} + +func (m *ProjectGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantID.Merge(m, src) +} +func (m *ProjectGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantID.Size(m) +} +func (m *ProjectGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantID proto.InternalMessageInfo + +func (m *ProjectGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type GrantedGrantID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantedGrantID) Reset() { *m = GrantedGrantID{} } +func (m *GrantedGrantID) String() string { return proto.CompactTextString(m) } +func (*GrantedGrantID) ProtoMessage() {} +func (*GrantedGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{85} +} + +func (m *GrantedGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantedGrantID.Unmarshal(m, b) +} +func (m *GrantedGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantedGrantID.Marshal(b, m, deterministic) +} +func (m *GrantedGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantedGrantID.Merge(m, src) +} +func (m *GrantedGrantID) XXX_Size() int { + return xxx_messageInfo_GrantedGrantID.Size(m) +} +func (m *GrantedGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_GrantedGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantedGrantID proto.InternalMessageInfo + +func (m *GrantedGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchResponse) Reset() { *m = ProjectGrantSearchResponse{} } +func (m *ProjectGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchResponse) ProtoMessage() {} +func (*ProjectGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{86} +} + +func (m *ProjectGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchResponse.Merge(m, src) +} +func (m *ProjectGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchResponse.Size(m) +} +func (m *ProjectGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetResult() []*ProjectGrant { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchRequest) Reset() { *m = ProjectGrantSearchRequest{} } +func (m *ProjectGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{87} +} + +func (m *ProjectGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchRequest.Size(m) +} +func (m *ProjectGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type ProjectGrantMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRoles) Reset() { *m = ProjectGrantMemberRoles{} } +func (m *ProjectGrantMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRoles) ProtoMessage() {} +func (*ProjectGrantMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{88} +} + +func (m *ProjectGrantMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRoles.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRoles.Merge(m, src) +} +func (m *ProjectGrantMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRoles.Size(m) +} +func (m *ProjectGrantMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRoles proto.InternalMessageInfo + +func (m *ProjectGrantMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMember) Reset() { *m = ProjectGrantMember{} } +func (m *ProjectGrantMember) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMember) ProtoMessage() {} +func (*ProjectGrantMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{89} +} + +func (m *ProjectGrantMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMember.Unmarshal(m, b) +} +func (m *ProjectGrantMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMember.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMember.Merge(m, src) +} +func (m *ProjectGrantMember) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMember.Size(m) +} +func (m *ProjectGrantMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMember proto.InternalMessageInfo + +func (m *ProjectGrantMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectGrantMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectGrantMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectGrantMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectGrantMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectGrantMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrantMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectGrantMemberAdd struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberAdd) Reset() { *m = ProjectGrantMemberAdd{} } +func (m *ProjectGrantMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberAdd) ProtoMessage() {} +func (*ProjectGrantMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{90} +} + +func (m *ProjectGrantMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberAdd.Unmarshal(m, b) +} +func (m *ProjectGrantMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberAdd.Merge(m, src) +} +func (m *ProjectGrantMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberAdd.Size(m) +} +func (m *ProjectGrantMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberAdd proto.InternalMessageInfo + +func (m *ProjectGrantMemberAdd) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberChange struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberChange) Reset() { *m = ProjectGrantMemberChange{} } +func (m *ProjectGrantMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberChange) ProtoMessage() {} +func (*ProjectGrantMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{91} +} + +func (m *ProjectGrantMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberChange.Unmarshal(m, b) +} +func (m *ProjectGrantMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberChange.Merge(m, src) +} +func (m *ProjectGrantMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberChange.Size(m) +} +func (m *ProjectGrantMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberChange proto.InternalMessageInfo + +func (m *ProjectGrantMemberChange) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberRemove struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRemove) Reset() { *m = ProjectGrantMemberRemove{} } +func (m *ProjectGrantMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRemove) ProtoMessage() {} +func (*ProjectGrantMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{92} +} + +func (m *ProjectGrantMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRemove.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRemove.Merge(m, src) +} +func (m *ProjectGrantMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRemove.Size(m) +} +func (m *ProjectGrantMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRemove proto.InternalMessageInfo + +func (m *ProjectGrantMemberRemove) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectGrantMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrantMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchResponse) Reset() { *m = ProjectGrantMemberSearchResponse{} } +func (m *ProjectGrantMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchResponse) ProtoMessage() {} +func (*ProjectGrantMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{93} +} + +func (m *ProjectGrantMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchResponse.Merge(m, src) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Size(m) +} +func (m *ProjectGrantMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetResult() []*ProjectGrantMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + Offset uint64 `protobuf:"varint,3,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,4,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectGrantMemberSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchRequest) Reset() { *m = ProjectGrantMemberSearchRequest{} } +func (m *ProjectGrantMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchRequest) ProtoMessage() {} +func (*ProjectGrantMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{94} +} + +func (m *ProjectGrantMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchRequest.Merge(m, src) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Size(m) +} +func (m *ProjectGrantMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetQueries() []*ProjectGrantMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantMemberSearchQuery struct { + Key ProjectGrantMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchQuery) Reset() { *m = ProjectGrantMemberSearchQuery{} } +func (m *ProjectGrantMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchQuery) ProtoMessage() {} +func (*ProjectGrantMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{95} +} + +func (m *ProjectGrantMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchQuery.Merge(m, src) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Size(m) +} +func (m *ProjectGrantMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchQuery) GetKey() ProjectGrantMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectGrantMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectGrantMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,3,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State UserGrantState `protobuf:"varint,6,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,10,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,11,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + OrgName string `protobuf:"bytes,13,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,14,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + ProjectName string `protobuf:"bytes,15,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrant) Reset() { *m = UserGrant{} } +func (m *UserGrant) String() string { return proto.CompactTextString(m) } +func (*UserGrant) ProtoMessage() {} +func (*UserGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{96} +} + +func (m *UserGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrant.Unmarshal(m, b) +} +func (m *UserGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrant.Marshal(b, m, deterministic) +} +func (m *UserGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrant.Merge(m, src) +} +func (m *UserGrant) XXX_Size() int { + return xxx_messageInfo_UserGrant.Size(m) +} +func (m *UserGrant) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrant proto.InternalMessageInfo + +func (m *UserGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *UserGrant) GetState() UserGrantState { + if m != nil { + return m.State + } + return UserGrantState_USERGRANTSTATE_UNSPECIFIED +} + +func (m *UserGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *UserGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *UserGrant) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UserGrant) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserGrant) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserGrant) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserGrant) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *UserGrant) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *UserGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type UserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,3,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantCreate) Reset() { *m = UserGrantCreate{} } +func (m *UserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*UserGrantCreate) ProtoMessage() {} +func (*UserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{97} +} + +func (m *UserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantCreate.Unmarshal(m, b) +} +func (m *UserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantCreate.Marshal(b, m, deterministic) +} +func (m *UserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantCreate.Merge(m, src) +} +func (m *UserGrantCreate) XXX_Size() int { + return xxx_messageInfo_UserGrantCreate.Size(m) +} +func (m *UserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantCreate proto.InternalMessageInfo + +func (m *UserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantUpdate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantUpdate) Reset() { *m = UserGrantUpdate{} } +func (m *UserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*UserGrantUpdate) ProtoMessage() {} +func (*UserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{98} +} + +func (m *UserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantUpdate.Unmarshal(m, b) +} +func (m *UserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *UserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantUpdate.Merge(m, src) +} +func (m *UserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_UserGrantUpdate.Size(m) +} +func (m *UserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantUpdate proto.InternalMessageInfo + +func (m *UserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantID struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantID) Reset() { *m = UserGrantID{} } +func (m *UserGrantID) String() string { return proto.CompactTextString(m) } +func (*UserGrantID) ProtoMessage() {} +func (*UserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{99} +} + +func (m *UserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantID.Unmarshal(m, b) +} +func (m *UserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantID.Marshal(b, m, deterministic) +} +func (m *UserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantID.Merge(m, src) +} +func (m *UserGrantID) XXX_Size() int { + return xxx_messageInfo_UserGrantID.Size(m) +} +func (m *UserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantID proto.InternalMessageInfo + +func (m *UserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantID) Reset() { *m = ProjectUserGrantID{} } +func (m *ProjectUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantID) ProtoMessage() {} +func (*ProjectUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{100} +} + +func (m *ProjectUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantID.Unmarshal(m, b) +} +func (m *ProjectUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantID.Merge(m, src) +} +func (m *ProjectUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantID.Size(m) +} +func (m *ProjectUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantID proto.InternalMessageInfo + +func (m *ProjectUserGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantUpdate) Reset() { *m = ProjectUserGrantUpdate{} } +func (m *ProjectUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantUpdate) ProtoMessage() {} +func (*ProjectUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{101} +} + +func (m *ProjectUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantUpdate.Merge(m, src) +} +func (m *ProjectUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantUpdate.Size(m) +} +func (m *ProjectUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectUserGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantID struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantID) Reset() { *m = ProjectGrantUserGrantID{} } +func (m *ProjectGrantUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantID) ProtoMessage() {} +func (*ProjectGrantUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{102} +} + +func (m *ProjectGrantUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantID.Merge(m, src) +} +func (m *ProjectGrantUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantID.Size(m) +} +func (m *ProjectGrantUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantID proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantID) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantUserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectGrantId string `protobuf:"bytes,3,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantCreate) Reset() { *m = ProjectGrantUserGrantCreate{} } +func (m *ProjectGrantUserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantCreate) ProtoMessage() {} +func (*ProjectGrantUserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{103} +} + +func (m *ProjectGrantUserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantCreate.Merge(m, src) +} +func (m *ProjectGrantUserGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Size(m) +} +func (m *ProjectGrantUserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantUpdate struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantUpdate) Reset() { *m = ProjectGrantUserGrantUpdate{} } +func (m *ProjectGrantUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{104} +} + +func (m *ProjectGrantUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Size(m) +} +func (m *ProjectGrantUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantUpdate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*UserGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchResponse) Reset() { *m = UserGrantSearchResponse{} } +func (m *UserGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchResponse) ProtoMessage() {} +func (*UserGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{105} +} + +func (m *UserGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchResponse.Unmarshal(m, b) +} +func (m *UserGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchResponse.Merge(m, src) +} +func (m *UserGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchResponse.Size(m) +} +func (m *UserGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchResponse proto.InternalMessageInfo + +func (m *UserGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserGrantSearchResponse) GetResult() []*UserGrant { + if m != nil { + return m.Result + } + return nil +} + +type UserGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchRequest) Reset() { *m = UserGrantSearchRequest{} } +func (m *UserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchRequest) ProtoMessage() {} +func (*UserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{106} +} + +func (m *UserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchRequest.Unmarshal(m, b) +} +func (m *UserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchRequest.Merge(m, src) +} +func (m *UserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchRequest.Size(m) +} +func (m *UserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchRequest proto.InternalMessageInfo + +func (m *UserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserGrantSearchQuery struct { + Key UserGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchQuery) Reset() { *m = UserGrantSearchQuery{} } +func (m *UserGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchQuery) ProtoMessage() {} +func (*UserGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{107} +} + +func (m *UserGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchQuery.Unmarshal(m, b) +} +func (m *UserGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchQuery.Merge(m, src) +} +func (m *UserGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchQuery.Size(m) +} +func (m *UserGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchQuery proto.InternalMessageInfo + +func (m *UserGrantSearchQuery) GetKey() UserGrantSearchKey { + if m != nil { + return m.Key + } + return UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *UserGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectUserGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantSearchRequest) Reset() { *m = ProjectUserGrantSearchRequest{} } +func (m *ProjectUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{108} +} + +func (m *ProjectUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Size(m) +} +func (m *ProjectUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectUserGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantUserGrantSearchRequest struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantSearchRequest) Reset() { *m = ProjectGrantUserGrantSearchRequest{} } +func (m *ProjectGrantUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{109} +} + +func (m *ProjectGrantUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Size(m) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantSearchRequest) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn AuthGrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*AuthGrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchRequest) Reset() { *m = AuthGrantSearchRequest{} } +func (m *AuthGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchRequest) ProtoMessage() {} +func (*AuthGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{110} +} + +func (m *AuthGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchRequest.Unmarshal(m, b) +} +func (m *AuthGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchRequest.Merge(m, src) +} +func (m *AuthGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchRequest.Size(m) +} +func (m *AuthGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchRequest proto.InternalMessageInfo + +func (m *AuthGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetSortingColumn() AuthGrantSearchKey { + if m != nil { + return m.SortingColumn + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *AuthGrantSearchRequest) GetQueries() []*AuthGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchQuery struct { + Key AuthGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchQuery) Reset() { *m = AuthGrantSearchQuery{} } +func (m *AuthGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchQuery) ProtoMessage() {} +func (*AuthGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{111} +} + +func (m *AuthGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchQuery.Unmarshal(m, b) +} +func (m *AuthGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchQuery.Merge(m, src) +} +func (m *AuthGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchQuery.Size(m) +} +func (m *AuthGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchQuery proto.InternalMessageInfo + +func (m *AuthGrantSearchQuery) GetKey() AuthGrantSearchKey { + if m != nil { + return m.Key + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *AuthGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type AuthGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*AuthGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchResponse) Reset() { *m = AuthGrantSearchResponse{} } +func (m *AuthGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchResponse) ProtoMessage() {} +func (*AuthGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{112} +} + +func (m *AuthGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchResponse.Unmarshal(m, b) +} +func (m *AuthGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchResponse.Merge(m, src) +} +func (m *AuthGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchResponse.Size(m) +} +func (m *AuthGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchResponse proto.InternalMessageInfo + +func (m *AuthGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetResult() []*AuthGrant { + if m != nil { + return m.Result + } + return nil +} + +type AuthGrant struct { + OrgId string `protobuf:"bytes,1,opt,name=orgId,proto3" json:"orgId,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=projectId,proto3" json:"projectId,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=userId,proto3" json:"userId,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrant) Reset() { *m = AuthGrant{} } +func (m *AuthGrant) String() string { return proto.CompactTextString(m) } +func (*AuthGrant) ProtoMessage() {} +func (*AuthGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{113} +} + +func (m *AuthGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrant.Unmarshal(m, b) +} +func (m *AuthGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrant.Marshal(b, m, deterministic) +} +func (m *AuthGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrant.Merge(m, src) +} +func (m *AuthGrant) XXX_Size() int { + return xxx_messageInfo_AuthGrant.Size(m) +} +func (m *AuthGrant) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrant proto.InternalMessageInfo + +func (m *AuthGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AuthGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *AuthGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AuthGrant) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func init() { + proto.RegisterEnum("caos.zitadel.management.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserSearchKey", UserSearchKey_name, UserSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MfaType", MfaType_name, MfaType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MFAState", MFAState_name, MFAState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.NotificationType", NotificationType_name, NotificationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.PolicyState", PolicyState_name, PolicyState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgMemberSearchKey", OrgMemberSearchKey_name, OrgMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectState", ProjectState_name, ProjectState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectType", ProjectType_name, ProjectType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectSearchKey", ProjectSearchKey_name, ProjectSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectRoleSearchKey", ProjectRoleSearchKey_name, ProjectRoleSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectMemberSearchKey", ProjectMemberSearchKey_name, ProjectMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AppState", AppState_name, AppState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantState", ProjectGrantState_name, ProjectGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey", ProjectGrantMemberSearchKey_name, ProjectGrantMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantState", UserGrantState_name, UserGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantSearchKey", UserGrantSearchKey_name, UserGrantSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AuthGrantSearchKey", AuthGrantSearchKey_name, AuthGrantSearchKey_value) + proto.RegisterType((*ChangeRequest)(nil), "caos.zitadel.management.api.v1.ChangeRequest") + proto.RegisterType((*Changes)(nil), "caos.zitadel.management.api.v1.Changes") + proto.RegisterType((*Change)(nil), "caos.zitadel.management.api.v1.Change") + proto.RegisterType((*ApplicationID)(nil), "caos.zitadel.management.api.v1.ApplicationID") + proto.RegisterType((*ProjectID)(nil), "caos.zitadel.management.api.v1.ProjectID") + proto.RegisterType((*UserID)(nil), "caos.zitadel.management.api.v1.UserID") + proto.RegisterType((*UserEmailID)(nil), "caos.zitadel.management.api.v1.UserEmailID") + proto.RegisterType((*UniqueUserRequest)(nil), "caos.zitadel.management.api.v1.UniqueUserRequest") + proto.RegisterType((*UniqueUserResponse)(nil), "caos.zitadel.management.api.v1.UniqueUserResponse") + proto.RegisterType((*CreateUserRequest)(nil), "caos.zitadel.management.api.v1.CreateUserRequest") + proto.RegisterType((*User)(nil), "caos.zitadel.management.api.v1.User") + proto.RegisterType((*UserSearchRequest)(nil), "caos.zitadel.management.api.v1.UserSearchRequest") + proto.RegisterType((*UserSearchQuery)(nil), "caos.zitadel.management.api.v1.UserSearchQuery") + proto.RegisterType((*UserSearchResponse)(nil), "caos.zitadel.management.api.v1.UserSearchResponse") + proto.RegisterType((*UserProfile)(nil), "caos.zitadel.management.api.v1.UserProfile") + proto.RegisterType((*UpdateUserProfileRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserProfileRequest") + proto.RegisterType((*UserEmail)(nil), "caos.zitadel.management.api.v1.UserEmail") + proto.RegisterType((*UpdateUserEmailRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserEmailRequest") + proto.RegisterType((*UserPhone)(nil), "caos.zitadel.management.api.v1.UserPhone") + proto.RegisterType((*UpdateUserPhoneRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserPhoneRequest") + proto.RegisterType((*UserAddress)(nil), "caos.zitadel.management.api.v1.UserAddress") + proto.RegisterType((*UpdateUserAddressRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserAddressRequest") + proto.RegisterType((*MultiFactors)(nil), "caos.zitadel.management.api.v1.MultiFactors") + proto.RegisterType((*MultiFactor)(nil), "caos.zitadel.management.api.v1.MultiFactor") + proto.RegisterType((*PasswordID)(nil), "caos.zitadel.management.api.v1.PasswordID") + proto.RegisterType((*PasswordRequest)(nil), "caos.zitadel.management.api.v1.PasswordRequest") + proto.RegisterType((*ResetPasswordRequest)(nil), "caos.zitadel.management.api.v1.ResetPasswordRequest") + proto.RegisterType((*SetPasswordNotificationRequest)(nil), "caos.zitadel.management.api.v1.SetPasswordNotificationRequest") + proto.RegisterType((*PasswordComplexityPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyID") + proto.RegisterType((*PasswordComplexityPolicy)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicy") + proto.RegisterType((*PasswordComplexityPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyCreate") + proto.RegisterType((*PasswordComplexityPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyUpdate") + proto.RegisterType((*PasswordAgePolicyID)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyID") + proto.RegisterType((*PasswordAgePolicy)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicy") + proto.RegisterType((*PasswordAgePolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyCreate") + proto.RegisterType((*PasswordAgePolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyUpdate") + proto.RegisterType((*PasswordLockoutPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyID") + proto.RegisterType((*PasswordLockoutPolicy)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicy") + proto.RegisterType((*PasswordLockoutPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyCreate") + proto.RegisterType((*PasswordLockoutPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyUpdate") + proto.RegisterType((*OrgID)(nil), "caos.zitadel.management.api.v1.OrgID") + proto.RegisterType((*OrgDomain)(nil), "caos.zitadel.management.api.v1.OrgDomain") + proto.RegisterType((*Org)(nil), "caos.zitadel.management.api.v1.Org") + proto.RegisterType((*OrgMemberRoles)(nil), "caos.zitadel.management.api.v1.OrgMemberRoles") + proto.RegisterType((*OrgMember)(nil), "caos.zitadel.management.api.v1.OrgMember") + proto.RegisterType((*AddOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.AddOrgMemberRequest") + proto.RegisterType((*ChangeOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.ChangeOrgMemberRequest") + proto.RegisterType((*RemoveOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.RemoveOrgMemberRequest") + proto.RegisterType((*OrgMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchResponse") + proto.RegisterType((*OrgMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchRequest") + proto.RegisterType((*OrgMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchQuery") + proto.RegisterType((*ProjectCreateRequest)(nil), "caos.zitadel.management.api.v1.ProjectCreateRequest") + proto.RegisterType((*ProjectUpdateRequest)(nil), "caos.zitadel.management.api.v1.ProjectUpdateRequest") + proto.RegisterType((*Projects)(nil), "caos.zitadel.management.api.v1.Projects") + proto.RegisterType((*Project)(nil), "caos.zitadel.management.api.v1.Project") + proto.RegisterType((*ProjectSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectSearchResponse") + proto.RegisterType((*ProjectSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectSearchRequest") + proto.RegisterType((*ProjectSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectSearchQuery") + proto.RegisterType((*ProjectMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectMemberRoles") + proto.RegisterType((*ProjectMember)(nil), "caos.zitadel.management.api.v1.ProjectMember") + proto.RegisterType((*ProjectMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectMemberAdd") + proto.RegisterType((*ProjectMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectMemberChange") + proto.RegisterType((*ProjectMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectMemberRemove") + proto.RegisterType((*ProjectRoleAdd)(nil), "caos.zitadel.management.api.v1.ProjectRoleAdd") + proto.RegisterType((*ProjectRole)(nil), "caos.zitadel.management.api.v1.ProjectRole") + proto.RegisterType((*ProjectRoleRemove)(nil), "caos.zitadel.management.api.v1.ProjectRoleRemove") + proto.RegisterType((*ProjectRoleSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchResponse") + proto.RegisterType((*ProjectRoleSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchRequest") + proto.RegisterType((*ProjectRoleSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchQuery") + proto.RegisterType((*ProjectMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchResponse") + proto.RegisterType((*ProjectMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchRequest") + proto.RegisterType((*ProjectMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchQuery") + proto.RegisterType((*Application)(nil), "caos.zitadel.management.api.v1.Application") + proto.RegisterType((*ApplicationUpdate)(nil), "caos.zitadel.management.api.v1.ApplicationUpdate") + proto.RegisterType((*OIDCConfig)(nil), "caos.zitadel.management.api.v1.OIDCConfig") + proto.RegisterType((*OIDCApplicationCreate)(nil), "caos.zitadel.management.api.v1.OIDCApplicationCreate") + proto.RegisterType((*OIDCConfigUpdate)(nil), "caos.zitadel.management.api.v1.OIDCConfigUpdate") + proto.RegisterType((*ClientSecret)(nil), "caos.zitadel.management.api.v1.ClientSecret") + proto.RegisterType((*ApplicationSearchResponse)(nil), "caos.zitadel.management.api.v1.ApplicationSearchResponse") + proto.RegisterType((*ApplicationSearchRequest)(nil), "caos.zitadel.management.api.v1.ApplicationSearchRequest") + proto.RegisterType((*ApplicationSearchQuery)(nil), "caos.zitadel.management.api.v1.ApplicationSearchQuery") + proto.RegisterType((*ProjectGrant)(nil), "caos.zitadel.management.api.v1.ProjectGrant") + proto.RegisterType((*ProjectGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantCreate") + proto.RegisterType((*ProjectGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUpdate") + proto.RegisterType((*ProjectGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantID") + proto.RegisterType((*GrantedGrantID)(nil), "caos.zitadel.management.api.v1.GrantedGrantID") + proto.RegisterType((*ProjectGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchResponse") + proto.RegisterType((*ProjectGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchRequest") + proto.RegisterType((*ProjectGrantMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRoles") + proto.RegisterType((*ProjectGrantMember)(nil), "caos.zitadel.management.api.v1.ProjectGrantMember") + proto.RegisterType((*ProjectGrantMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberAdd") + proto.RegisterType((*ProjectGrantMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberChange") + proto.RegisterType((*ProjectGrantMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRemove") + proto.RegisterType((*ProjectGrantMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchResponse") + proto.RegisterType((*ProjectGrantMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchRequest") + proto.RegisterType((*ProjectGrantMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchQuery") + proto.RegisterType((*UserGrant)(nil), "caos.zitadel.management.api.v1.UserGrant") + proto.RegisterType((*UserGrantCreate)(nil), "caos.zitadel.management.api.v1.UserGrantCreate") + proto.RegisterType((*UserGrantUpdate)(nil), "caos.zitadel.management.api.v1.UserGrantUpdate") + proto.RegisterType((*UserGrantID)(nil), "caos.zitadel.management.api.v1.UserGrantID") + proto.RegisterType((*ProjectUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantID") + proto.RegisterType((*ProjectUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantUpdate") + proto.RegisterType((*ProjectGrantUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantID") + proto.RegisterType((*ProjectGrantUserGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantCreate") + proto.RegisterType((*ProjectGrantUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantUpdate") + proto.RegisterType((*UserGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.UserGrantSearchResponse") + proto.RegisterType((*UserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.UserGrantSearchRequest") + proto.RegisterType((*UserGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.UserGrantSearchQuery") + proto.RegisterType((*ProjectUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantSearchRequest") + proto.RegisterType((*ProjectGrantUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchQuery") + proto.RegisterType((*AuthGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchResponse") + proto.RegisterType((*AuthGrant)(nil), "caos.zitadel.management.api.v1.AuthGrant") +} + +func init() { proto.RegisterFile("management.proto", fileDescriptor_edc174f991dc0a25) } + +var fileDescriptor_edc174f991dc0a25 = []byte{ + // 7933 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7d, 0x6b, 0x70, 0x1b, 0x59, + 0x76, 0xde, 0x34, 0x00, 0xbe, 0x0e, 0x5f, 0xe0, 0xe5, 0x0b, 0x02, 0x1f, 0xa2, 0x5a, 0x6f, 0x48, + 0x22, 0x24, 0x8e, 0x46, 0x9a, 0x91, 0x76, 0xa4, 0x01, 0x09, 0x88, 0x82, 0x87, 0x04, 0xb8, 0x20, + 0x35, 0xca, 0xd8, 0xce, 0xc0, 0x2d, 0xa0, 0x05, 0xc2, 0x03, 0xa2, 0xb1, 0xdd, 0x0d, 0x69, 0xb8, + 0x93, 0xa9, 0x4d, 0x71, 0xab, 0x52, 0x2e, 0x27, 0x8e, 0xb3, 0xbb, 0x76, 0x52, 0xd9, 0xaa, 0xcd, + 0x26, 0x9b, 0x87, 0x93, 0x6c, 0x26, 0x8f, 0xf2, 0xb0, 0x6a, 0x6d, 0x27, 0x1b, 0x57, 0x36, 0x95, + 0x8a, 0x1f, 0x3f, 0xe2, 0x6c, 0x2a, 0xae, 0x54, 0xf9, 0x4f, 0x36, 0x89, 0xab, 0xf2, 0x2b, 0xe5, + 0x3c, 0x7e, 0x78, 0x7e, 0x38, 0xae, 0xfb, 0xe8, 0xee, 0xdb, 0x2f, 0xa0, 0x1b, 0x24, 0xb5, 0x5a, + 0xef, 0xfc, 0x12, 0x71, 0x9f, 0xdf, 0x39, 0xf7, 0x9c, 0x73, 0xcf, 0x3d, 0xf7, 0xf6, 0x11, 0xc4, + 0xf7, 0xa4, 0xa6, 0x54, 0x93, 0xf7, 0xe4, 0xa6, 0xbe, 0xdc, 0x52, 0x15, 0x5d, 0x41, 0x8b, 0x15, + 0x49, 0xd1, 0x96, 0xbf, 0x58, 0xd7, 0xa5, 0xaa, 0xdc, 0x58, 0xe6, 0xaa, 0xa5, 0x56, 0x7d, 0xf9, + 0xd9, 0x8d, 0xe4, 0x7c, 0x4d, 0x51, 0x6a, 0x0d, 0x39, 0x2d, 0xb5, 0xea, 0x69, 0xa9, 0xd9, 0x54, + 0x74, 0x49, 0xaf, 0x2b, 0x4d, 0x8d, 0xf6, 0x4e, 0xce, 0xb1, 0x5a, 0xf2, 0xeb, 0x49, 0xfb, 0x69, + 0x5a, 0xde, 0x6b, 0xe9, 0xfb, 0xac, 0x72, 0xde, 0x59, 0xa9, 0xe9, 0x6a, 0xbb, 0xc2, 0x26, 0x4e, + 0x9e, 0x76, 0xd6, 0xea, 0xf5, 0x3d, 0x59, 0xd3, 0xa5, 0xbd, 0x16, 0x6b, 0x70, 0x95, 0xfc, 0x53, + 0xb9, 0x56, 0x93, 0x9b, 0xd7, 0xb4, 0xe7, 0x52, 0xad, 0x26, 0xab, 0x69, 0xa5, 0x45, 0x66, 0xf7, + 0x40, 0x32, 0xfb, 0x4c, 0x6a, 0xd4, 0xab, 0x92, 0x2e, 0xa7, 0x8d, 0x3f, 0x58, 0xc5, 0x92, 0x73, + 0x9e, 0xaa, 0xac, 0x55, 0xd4, 0x7a, 0x4b, 0x57, 0x54, 0xd6, 0x22, 0x21, 0xb5, 0xf5, 0x5d, 0x3a, + 0xb2, 0x31, 0x01, 0xad, 0x11, 0xdf, 0x83, 0xd1, 0xb5, 0x5d, 0xa9, 0x59, 0x93, 0x4b, 0xf2, 0x17, + 0xda, 0xb2, 0xa6, 0xa3, 0x31, 0x88, 0xd4, 0xab, 0x09, 0x61, 0x49, 0xb8, 0x34, 0x54, 0x8a, 0xd4, + 0xab, 0x68, 0x0a, 0xfa, 0x1a, 0xf5, 0xbd, 0xba, 0x9e, 0x88, 0x2c, 0x09, 0x97, 0x62, 0x25, 0xfa, + 0x03, 0x5d, 0x84, 0x71, 0x0d, 0x77, 0x68, 0x56, 0xe4, 0xb2, 0xf2, 0xf4, 0xa9, 0x26, 0xeb, 0x89, + 0x28, 0xa9, 0x1f, 0x33, 0x8a, 0x8b, 0xa4, 0x54, 0xdc, 0x87, 0x01, 0x3a, 0xbe, 0x86, 0xde, 0x82, + 0x81, 0x0a, 0xfd, 0x33, 0x21, 0x2c, 0x45, 0x2f, 0x0d, 0xaf, 0x5c, 0x58, 0xee, 0xbc, 0x32, 0xcb, + 0x0c, 0x99, 0xd1, 0x0d, 0xcd, 0x40, 0x3f, 0x9b, 0x8c, 0x82, 0x61, 0xbf, 0x2c, 0x8c, 0x51, 0x0e, + 0xa3, 0xf8, 0x5b, 0x02, 0xf4, 0xd3, 0x11, 0xd0, 0x5d, 0x18, 0xa6, 0x63, 0x94, 0x31, 0xdb, 0x08, + 0x75, 0xc3, 0x2b, 0xc9, 0x65, 0xca, 0xb7, 0x65, 0x83, 0x6f, 0xcb, 0x3b, 0xc6, 0xfa, 0x94, 0x80, + 0x36, 0xcf, 0x4a, 0xba, 0x8c, 0x16, 0x00, 0xe4, 0x67, 0x72, 0x53, 0x2f, 0xeb, 0xfb, 0x2d, 0x99, + 0xcc, 0x3c, 0x54, 0x1a, 0x22, 0x25, 0x3b, 0xfb, 0x2d, 0x19, 0x25, 0x61, 0xd0, 0xa0, 0x99, 0xcd, + 0x6f, 0xfe, 0xc6, 0x75, 0x7b, 0x4a, 0xb5, 0xfe, 0xb4, 0x2e, 0xab, 0x89, 0x18, 0xe9, 0x68, 0xfe, + 0x46, 0x57, 0x20, 0x56, 0x95, 0x74, 0x29, 0xd1, 0x47, 0xc0, 0xcc, 0xba, 0xc0, 0x6c, 0x13, 0x51, + 0x2a, 0x91, 0x46, 0xe2, 0x3d, 0x18, 0xcd, 0xb4, 0x5a, 0x8d, 0x7a, 0x85, 0x48, 0x44, 0x3e, 0xeb, + 0x5a, 0xa6, 0x05, 0x80, 0x96, 0xaa, 0xfc, 0xac, 0x5c, 0xd1, 0xcb, 0xf5, 0xaa, 0x01, 0x92, 0x95, + 0xe4, 0xab, 0xe2, 0x1c, 0x0c, 0x6d, 0xb1, 0x1f, 0xae, 0xbe, 0x62, 0x02, 0xfa, 0x1f, 0x69, 0xb2, + 0xea, 0x51, 0x73, 0x16, 0x86, 0x71, 0x4d, 0x6e, 0x4f, 0xaa, 0x37, 0xf2, 0x59, 0xcc, 0x67, 0x19, + 0xff, 0xc9, 0x5a, 0xd0, 0x1f, 0xe2, 0x7b, 0x30, 0xf1, 0xa8, 0x59, 0xff, 0x42, 0x5b, 0xc6, 0x4d, + 0x0d, 0x31, 0xba, 0x08, 0x43, 0x6d, 0x4d, 0x56, 0xcb, 0x4d, 0x69, 0x8f, 0xf2, 0x7b, 0x68, 0x15, + 0x3e, 0x5d, 0x1d, 0x50, 0xfb, 0xe2, 0x42, 0xe2, 0xdf, 0x0b, 0xa5, 0x41, 0x5c, 0x59, 0x90, 0xf6, + 0x64, 0xb4, 0x64, 0x8c, 0x19, 0x71, 0x35, 0x62, 0xe3, 0xdf, 0x00, 0xc4, 0x8f, 0xaf, 0xb5, 0x94, + 0xa6, 0x26, 0xa3, 0x39, 0x18, 0xaa, 0x6b, 0xe5, 0x36, 0xa9, 0x20, 0x13, 0x0c, 0x96, 0x06, 0xeb, + 0x1a, 0x6d, 0x28, 0xfe, 0x8f, 0x3e, 0x98, 0x58, 0x53, 0x65, 0x49, 0xef, 0x0d, 0xd3, 0x65, 0x80, + 0xa7, 0x75, 0x55, 0xd3, 0x69, 0x4b, 0x37, 0xb0, 0x21, 0x52, 0x4b, 0x9a, 0x5e, 0x84, 0xa1, 0x86, + 0x64, 0xb4, 0x8c, 0xba, 0xc7, 0xc4, 0x95, 0xa4, 0xe1, 0x79, 0x18, 0x6a, 0xd6, 0x2b, 0xef, 0xd3, + 0x86, 0x44, 0x16, 0x56, 0x07, 0x3f, 0x5d, 0xed, 0x53, 0xa3, 0xa4, 0x19, 0xae, 0x22, 0xcd, 0xae, + 0xc0, 0x48, 0xb5, 0xae, 0xb5, 0x1a, 0xd2, 0x3e, 0x6d, 0xd9, 0xe7, 0x68, 0x39, 0xcc, 0x6a, 0x49, + 0xe3, 0xdb, 0x80, 0x5a, 0xaa, 0xfc, 0x54, 0x56, 0x55, 0xb9, 0x5a, 0x6e, 0x48, 0xcd, 0x5a, 0x5b, + 0xaa, 0xc9, 0x89, 0x7e, 0x47, 0x97, 0x09, 0xb3, 0xcd, 0x06, 0x6b, 0x82, 0xee, 0x41, 0x7f, 0x4d, + 0x6e, 0x56, 0x65, 0x35, 0x31, 0xb0, 0x24, 0x5c, 0x1a, 0xeb, 0xae, 0x89, 0xeb, 0xa4, 0x75, 0x89, + 0xf5, 0x42, 0xa2, 0xb1, 0x68, 0x83, 0x64, 0xae, 0x91, 0x4f, 0x57, 0x87, 0xd4, 0x01, 0x42, 0xf1, + 0xcf, 0x18, 0xcb, 0x86, 0x52, 0x30, 0x51, 0xd7, 0xca, 0xe4, 0xef, 0xf2, 0x33, 0x59, 0xc5, 0x42, + 0x5f, 0x4d, 0x0c, 0x91, 0x85, 0x1a, 0xaf, 0x6b, 0x44, 0xa4, 0xde, 0x61, 0xc5, 0x68, 0x01, 0xfa, + 0x5a, 0xbb, 0x4a, 0x53, 0x4e, 0x0c, 0x93, 0xf1, 0x06, 0x3e, 0x5d, 0x8d, 0xa9, 0x91, 0xc4, 0x54, + 0x89, 0x96, 0xb2, 0xa1, 0xc8, 0xdf, 0xd6, 0x50, 0x23, 0xc6, 0x50, 0x5b, 0xb8, 0xdc, 0x1c, 0x4a, + 0x84, 0x81, 0x8a, 0xd2, 0x6e, 0xea, 0xea, 0x7e, 0x62, 0xd4, 0xc1, 0x08, 0xa3, 0x02, 0x9d, 0x83, + 0xc1, 0x86, 0x52, 0x91, 0x1a, 0x75, 0x7d, 0x3f, 0x31, 0xe6, 0x5c, 0x0a, 0xa3, 0x06, 0x5d, 0x86, + 0xe1, 0x96, 0xa2, 0xe9, 0x52, 0xa3, 0x5c, 0x51, 0xaa, 0x72, 0x62, 0xdc, 0xd1, 0x10, 0x68, 0xe5, + 0x9a, 0x52, 0xc5, 0x42, 0xdc, 0xaf, 0xca, 0xb5, 0xba, 0xd2, 0x4c, 0xc4, 0x1d, 0xad, 0x58, 0x39, + 0x4a, 0xc3, 0x98, 0xa6, 0xab, 0xb2, 0xac, 0x97, 0xa5, 0x6a, 0x55, 0x95, 0x35, 0x2d, 0x31, 0xe1, + 0x68, 0x39, 0x4a, 0xeb, 0x33, 0xb4, 0x1a, 0x9d, 0x85, 0xc1, 0x96, 0xa4, 0x69, 0xcf, 0x15, 0xb5, + 0x9a, 0x40, 0x3c, 0x57, 0x1e, 0x96, 0xcc, 0x0a, 0xf1, 0x8f, 0xfb, 0x21, 0x86, 0x25, 0xdc, 0x65, + 0x0e, 0xee, 0x43, 0x9f, 0xa6, 0x63, 0x53, 0x17, 0x21, 0xeb, 0x7b, 0xb9, 0xdb, 0xfa, 0xe2, 0x41, + 0xb6, 0x71, 0x87, 0x12, 0xed, 0x87, 0xee, 0xc3, 0x68, 0x05, 0x2b, 0x50, 0x5d, 0x69, 0x52, 0x9b, + 0x19, 0xed, 0x6a, 0x33, 0x47, 0x8c, 0x0e, 0xc4, 0x6a, 0x3a, 0x4c, 0x6e, 0x2c, 0x94, 0xc9, 0x7d, + 0x03, 0x80, 0x68, 0x55, 0x43, 0xa9, 0xd5, 0x9b, 0xcc, 0x42, 0x76, 0xea, 0x4b, 0x74, 0x70, 0x03, + 0x37, 0x46, 0x39, 0x88, 0x1b, 0xec, 0x29, 0xd3, 0x11, 0xab, 0x44, 0x23, 0x3a, 0x0f, 0x30, 0x6e, + 0xf4, 0xa1, 0x1b, 0x46, 0x15, 0x9b, 0x17, 0xcb, 0x56, 0x0c, 0x50, 0xd3, 0x6d, 0xda, 0x87, 0x05, + 0x9b, 0x7d, 0x18, 0xa4, 0xc6, 0xd6, 0xb2, 0x09, 0x73, 0xbc, 0x4d, 0x18, 0xa2, 0x7d, 0x4d, 0x3b, + 0x70, 0xc6, 0xa1, 0xe0, 0x40, 0xea, 0x6d, 0x6a, 0x3d, 0xc7, 0x9b, 0x8a, 0x61, 0xda, 0xdf, 0x34, + 0x10, 0xd7, 0x3c, 0x75, 0x7e, 0x84, 0xb4, 0xea, 0xa8, 0xe9, 0xa3, 0x3d, 0x69, 0xba, 0x69, 0xf2, + 0xc7, 0x38, 0x93, 0xef, 0xad, 0xdb, 0xe3, 0xde, 0xba, 0x3d, 0x65, 0xe8, 0x76, 0x9c, 0x8e, 0xd0, + 0x41, 0xa5, 0x27, 0xbc, 0x55, 0x3a, 0x61, 0xa9, 0x34, 0xd1, 0x04, 0x4b, 0x91, 0x93, 0x9c, 0x22, + 0x4f, 0x32, 0x46, 0x1b, 0xea, 0x7b, 0xda, 0xae, 0xbe, 0x53, 0xa4, 0x9a, 0x57, 0xda, 0x19, 0x53, + 0x69, 0xa7, 0x49, 0x9d, 0xa1, 0xaa, 0xe7, 0x5d, 0xaa, 0x3a, 0x43, 0xea, 0xed, 0x0a, 0x2a, 0xfe, + 0x89, 0x00, 0x13, 0x44, 0x6d, 0x64, 0x49, 0xad, 0xec, 0x1a, 0x7b, 0x8c, 0xe5, 0xa2, 0x08, 0xde, + 0x2e, 0x8a, 0xcd, 0x8d, 0x7a, 0x0f, 0xc6, 0x34, 0x45, 0xd5, 0xeb, 0xcd, 0x5a, 0xb9, 0xa2, 0x34, + 0xda, 0x7b, 0x4d, 0xa2, 0x66, 0x63, 0x2b, 0xd7, 0x02, 0xe9, 0x2b, 0x99, 0xf8, 0x6d, 0x79, 0x9f, + 0x18, 0x91, 0x03, 0x21, 0xb2, 0xf4, 0x4a, 0x69, 0x94, 0x0d, 0xb7, 0x46, 0x46, 0x43, 0x71, 0x88, + 0x4a, 0x5a, 0x85, 0x28, 0xdf, 0x60, 0x09, 0xff, 0x89, 0xf2, 0x30, 0xf0, 0x85, 0xb6, 0xac, 0xd6, + 0x65, 0x2d, 0xd1, 0x47, 0x9c, 0xb0, 0x74, 0xf0, 0xa9, 0x3e, 0xdf, 0x96, 0xd5, 0xfd, 0x92, 0xd1, + 0x5f, 0xfc, 0x8e, 0x00, 0xe3, 0x8e, 0x4a, 0x94, 0x87, 0xe8, 0xfb, 0xf2, 0x3e, 0xa1, 0xfd, 0x08, + 0x54, 0xe0, 0x31, 0x50, 0x16, 0xfa, 0xf7, 0x64, 0x7d, 0x57, 0xa9, 0x32, 0x1b, 0x76, 0xb5, 0xdb, + 0x68, 0x74, 0xa4, 0x4d, 0xd2, 0xa7, 0xc4, 0xfa, 0x62, 0xbe, 0x3f, 0x93, 0x1a, 0x6d, 0xb6, 0x37, + 0x97, 0xe8, 0x0f, 0xf1, 0xef, 0x0a, 0x80, 0xf8, 0xb5, 0x63, 0x3e, 0x45, 0xb8, 0xc5, 0x3b, 0x03, + 0x23, 0xba, 0x82, 0xe5, 0x4b, 0x95, 0xb5, 0x76, 0xc3, 0x70, 0x3e, 0x87, 0x49, 0x59, 0x89, 0x14, + 0xa1, 0xcf, 0x61, 0x11, 0x23, 0x95, 0x31, 0xc2, 0xec, 0x73, 0x41, 0x38, 0x52, 0x62, 0x7d, 0xc4, + 0x3f, 0x8c, 0x50, 0xf7, 0x6b, 0x4b, 0x55, 0x9e, 0xd6, 0x1b, 0xf2, 0xf1, 0x1b, 0x79, 0xbb, 0x1d, + 0x8b, 0x76, 0xb4, 0x63, 0x31, 0x87, 0x1d, 0xb3, 0x19, 0xa9, 0x3e, 0x87, 0x91, 0x72, 0x1a, 0xb9, + 0x7e, 0xb7, 0x91, 0xf3, 0xb6, 0x63, 0x03, 0xdd, 0xed, 0xd8, 0x60, 0x4f, 0x76, 0xcc, 0x66, 0xcf, + 0x87, 0xec, 0xf6, 0x5c, 0xfc, 0x9d, 0x08, 0x24, 0x1e, 0xb5, 0xaa, 0xcc, 0x5d, 0x64, 0xec, 0xf6, + 0x3b, 0x10, 0x7d, 0xe6, 0x1c, 0x76, 0x66, 0xb5, 0xf8, 0xe7, 0x61, 0xc8, 0x3c, 0x34, 0x78, 0x1d, + 0x27, 0x39, 0x77, 0xbf, 0xe3, 0x7e, 0x12, 0xf5, 0xdc, 0x4f, 0xc4, 0x67, 0x30, 0x63, 0xad, 0x15, + 0xa9, 0xf2, 0x5b, 0xa9, 0xae, 0x47, 0x8b, 0x50, 0xf3, 0x32, 0xb2, 0xc8, 0xd6, 0xe4, 0x45, 0x16, + 0xdd, 0xe4, 0x22, 0x5d, 0x37, 0xb9, 0xa8, 0xe7, 0x26, 0x27, 0xb6, 0x79, 0xb2, 0x48, 0x95, 0x1f, + 0x59, 0xa7, 0x6d, 0x73, 0xad, 0x0e, 0x7d, 0xba, 0xda, 0xaf, 0xc6, 0xe2, 0x42, 0x17, 0x77, 0xd9, + 0x67, 0xda, 0x5f, 0x15, 0xa8, 0x8d, 0x31, 0xdc, 0x4e, 0xe7, 0x64, 0xdc, 0xde, 0x1b, 0xf1, 0xdf, + 0x7b, 0xa3, 0x9d, 0xf7, 0xde, 0x58, 0x87, 0xbd, 0xb7, 0xaf, 0xcb, 0xde, 0xdb, 0xef, 0xb5, 0xf7, + 0xfe, 0x6f, 0x81, 0x57, 0x58, 0x56, 0xea, 0xc7, 0x2f, 0xd1, 0x41, 0x42, 0xb7, 0x13, 0x41, 0x34, + 0xe8, 0x89, 0x20, 0x16, 0xe8, 0x44, 0xd0, 0x17, 0xf8, 0x44, 0xd0, 0xdf, 0xf1, 0x44, 0x20, 0x16, + 0x61, 0x64, 0xb3, 0xdd, 0xd0, 0xeb, 0x0f, 0xa4, 0x8a, 0xae, 0xa8, 0x1a, 0xba, 0x0f, 0xb1, 0xbd, + 0xa7, 0x92, 0x11, 0x4c, 0xb9, 0xd2, 0x4d, 0x4b, 0xb9, 0xbe, 0x25, 0xd2, 0x51, 0xfc, 0x79, 0x01, + 0x86, 0xb9, 0x52, 0x74, 0x17, 0x62, 0x24, 0xc4, 0x41, 0x77, 0xef, 0x8b, 0x5d, 0x07, 0x7c, 0x2a, + 0xed, 0xec, 0xb7, 0xe4, 0x12, 0xe9, 0x84, 0xee, 0xd9, 0x37, 0xa3, 0x4b, 0x5d, 0x7b, 0x3f, 0xc8, + 0xf0, 0x7b, 0x91, 0x38, 0x0f, 0xb0, 0xc5, 0x7c, 0x70, 0x8f, 0x40, 0xc4, 0x43, 0x18, 0x37, 0x6a, + 0xfd, 0x96, 0xf9, 0x3c, 0x77, 0x60, 0x72, 0x68, 0x06, 0x7f, 0x64, 0xba, 0x00, 0x53, 0x25, 0x59, + 0x93, 0xf5, 0x2e, 0xc3, 0x89, 0xcf, 0x60, 0x71, 0xdb, 0x6a, 0x55, 0x50, 0xf4, 0xfa, 0x53, 0x16, + 0x7d, 0xf1, 0x03, 0x90, 0x65, 0xec, 0xa3, 0x0c, 0xb8, 0xde, 0x8d, 0x01, 0xfc, 0x90, 0x16, 0x1f, + 0xc5, 0xab, 0x90, 0x34, 0x26, 0x5d, 0x53, 0xf6, 0x5a, 0x0d, 0xf9, 0x83, 0xba, 0xbe, 0xbf, 0xa5, + 0x34, 0xea, 0x95, 0x7d, 0x0f, 0xbe, 0x7c, 0x12, 0x85, 0x84, 0x5f, 0x73, 0x0f, 0x7b, 0x38, 0x6c, + 0x44, 0x06, 0xb1, 0x60, 0x46, 0xd8, 0xa6, 0x6c, 0x15, 0xa1, 0x8c, 0xb1, 0x88, 0xd4, 0x0d, 0xed, + 0x2a, 0x53, 0x74, 0xa2, 0xce, 0x07, 0xc7, 0xd8, 0xd1, 0x0e, 0x8e, 0x7d, 0x61, 0x63, 0x75, 0x7b, + 0xf5, 0x66, 0xb9, 0x21, 0x37, 0x6b, 0xfa, 0x2e, 0x51, 0xa8, 0x58, 0x69, 0x68, 0xaf, 0xde, 0xdc, + 0x20, 0x05, 0xe8, 0x2c, 0x8c, 0xee, 0x4a, 0x5a, 0xb9, 0xa1, 0x3c, 0x97, 0xd5, 0x8a, 0xa4, 0x51, + 0x7f, 0x63, 0xb0, 0x34, 0xb2, 0x2b, 0x69, 0x1b, 0x46, 0x99, 0xd1, 0xa8, 0xdd, 0x6a, 0xb1, 0x46, + 0x83, 0x66, 0xa3, 0x47, 0x46, 0x19, 0x9e, 0x08, 0x37, 0x6a, 0xb6, 0xf7, 0x9e, 0xc8, 0x2a, 0x0b, + 0x6b, 0x0c, 0xed, 0x4a, 0x5a, 0x81, 0x14, 0x18, 0xd5, 0xda, 0xfe, 0xde, 0x13, 0xa5, 0x41, 0xce, + 0x78, 0xb4, 0x7a, 0x9b, 0x14, 0x88, 0xff, 0x47, 0x80, 0x45, 0xbf, 0x65, 0xa3, 0x71, 0x2b, 0x94, + 0xb2, 0x2f, 0x96, 0xc0, 0xdb, 0x86, 0xff, 0x1b, 0xb5, 0x2f, 0x9b, 0x9d, 0xea, 0x48, 0x57, 0xaa, + 0xa3, 0x41, 0xa8, 0x8e, 0x75, 0xa5, 0xba, 0xaf, 0x33, 0xd5, 0xfd, 0x4e, 0xaa, 0xbf, 0x1c, 0xf1, + 0xa7, 0x9a, 0x5a, 0x73, 0x97, 0xc8, 0xa6, 0x3c, 0x44, 0x36, 0x18, 0x17, 0xa2, 0x5d, 0xb9, 0x10, + 0x0b, 0xc2, 0x85, 0xbe, 0xae, 0x5c, 0xe8, 0xef, 0xcc, 0x85, 0x01, 0x27, 0x17, 0xce, 0xc3, 0xa4, + 0xc1, 0x84, 0x4c, 0x4d, 0xf6, 0xd5, 0xec, 0xff, 0x18, 0x81, 0x09, 0x57, 0xbb, 0x1f, 0x47, 0x95, + 0x5e, 0x82, 0x91, 0x3d, 0xe9, 0x83, 0xb2, 0x44, 0x7a, 0xef, 0x6b, 0x4c, 0xa9, 0x61, 0x4f, 0xfa, + 0x20, 0x83, 0x5b, 0xec, 0x6b, 0xe8, 0x12, 0xc4, 0xe5, 0x0f, 0x5a, 0x75, 0x55, 0x2e, 0x3f, 0x97, + 0xd4, 0x26, 0x6d, 0x35, 0x40, 0x6f, 0x23, 0x68, 0xf9, 0x63, 0x49, 0x6d, 0xe2, 0x96, 0xe2, 0x57, + 0x04, 0x98, 0x75, 0x31, 0xb5, 0x07, 0x85, 0x73, 0x62, 0x8a, 0x04, 0xc2, 0x14, 0xf5, 0xc4, 0xf4, + 0x77, 0xbc, 0x30, 0x1d, 0x83, 0x3a, 0x38, 0x31, 0x46, 0x03, 0x61, 0x8c, 0x79, 0x62, 0xbc, 0x6c, + 0x41, 0xdc, 0x50, 0x2a, 0xef, 0x2b, 0x6d, 0xdd, 0x57, 0x6e, 0x7f, 0x10, 0x81, 0x69, 0xcf, 0xb6, + 0x3f, 0x8e, 0xb2, 0x7b, 0x86, 0xad, 0x81, 0xae, 0xcb, 0x7b, 0x2d, 0xdd, 0x90, 0xdd, 0x61, 0xbc, + 0x06, 0xac, 0x08, 0xbd, 0x0a, 0x33, 0xda, 0xae, 0xf2, 0xbc, 0xdc, 0x50, 0x2a, 0xef, 0x97, 0x95, + 0xb6, 0x5e, 0x7e, 0x2a, 0xd5, 0x1b, 0x6d, 0x55, 0xd6, 0x98, 0xe5, 0x98, 0xc4, 0xb5, 0x98, 0x91, + 0xc5, 0xb6, 0xfe, 0x80, 0x55, 0x61, 0x99, 0x99, 0xf3, 0x64, 0x72, 0x0f, 0xb2, 0xec, 0xc4, 0x18, + 0x09, 0x83, 0x31, 0xea, 0x8f, 0xf1, 0x5f, 0xf8, 0x61, 0x3c, 0x06, 0xd9, 0x76, 0x62, 0x8e, 0x86, + 0xc1, 0x1c, 0xf3, 0xc7, 0x3c, 0x0b, 0x7d, 0x45, 0xb5, 0xe6, 0x79, 0x11, 0x36, 0x54, 0x54, 0x6b, + 0x59, 0x65, 0x4f, 0xaa, 0x37, 0xf1, 0xe1, 0xa5, 0x4a, 0xfe, 0x62, 0x0d, 0xd8, 0x2f, 0xf1, 0xff, + 0x0b, 0x10, 0x2d, 0xaa, 0x35, 0x17, 0x65, 0x61, 0x5d, 0xe3, 0xa2, 0x5a, 0x7b, 0x89, 0x62, 0xf1, + 0x08, 0x62, 0x5c, 0x8c, 0x87, 0xfc, 0xcd, 0x71, 0xa0, 0xdf, 0xc6, 0x81, 0x0b, 0x30, 0x56, 0x54, + 0x6b, 0x9b, 0x32, 0xde, 0x07, 0x4b, 0x4a, 0x43, 0xd6, 0xf0, 0xc1, 0x58, 0xc5, 0x7f, 0x90, 0x53, + 0xca, 0x50, 0x89, 0xfe, 0x10, 0x7f, 0x25, 0x42, 0xf8, 0x49, 0x1b, 0xa2, 0x59, 0x18, 0x20, 0xb1, + 0x19, 0x93, 0x69, 0xfd, 0xf8, 0x67, 0xde, 0x11, 0x84, 0x8f, 0x38, 0x82, 0xf0, 0x66, 0x24, 0x21, + 0xca, 0x47, 0x12, 0xec, 0x21, 0xad, 0x58, 0xc7, 0x90, 0x56, 0x9f, 0x23, 0xa4, 0x65, 0x62, 0xed, + 0xe7, 0xb0, 0x3a, 0x99, 0x37, 0x10, 0x8a, 0x79, 0xae, 0xa5, 0x1b, 0x0c, 0xb7, 0x74, 0xe2, 0x4f, + 0xc1, 0x64, 0xa6, 0x5a, 0xb5, 0x98, 0xca, 0xce, 0x1e, 0xd3, 0xd0, 0xaf, 0xa8, 0x35, 0x8b, 0x63, + 0x7d, 0x8a, 0x5a, 0xcb, 0x57, 0x79, 0x4e, 0x46, 0x6c, 0x9c, 0x34, 0x49, 0x8b, 0xf2, 0xcb, 0xf0, + 0x1e, 0xcc, 0xd0, 0xfb, 0x8e, 0x13, 0x1a, 0xff, 0x21, 0xcc, 0x94, 0xe4, 0x3d, 0xe5, 0xd9, 0x91, + 0xc7, 0x17, 0x3f, 0x16, 0x60, 0xd6, 0x1c, 0xe4, 0xa4, 0xa3, 0xb6, 0x19, 0x47, 0xd4, 0xf6, 0x72, + 0x00, 0x85, 0x65, 0xe4, 0x19, 0xa1, 0xdb, 0x8f, 0x05, 0x98, 0x71, 0xe1, 0xed, 0x48, 0x7a, 0xa8, + 0xb7, 0x0d, 0xa8, 0x60, 0x85, 0xf1, 0x29, 0xc6, 0x9b, 0x81, 0x31, 0x7a, 0xc6, 0xf2, 0xff, 0x8d, + 0x00, 0x53, 0x5e, 0x2d, 0x50, 0x81, 0x0f, 0xe8, 0xaf, 0x84, 0x9c, 0xe4, 0x05, 0x47, 0xf5, 0x6f, + 0xc1, 0x14, 0x7b, 0xe4, 0x40, 0xb7, 0x41, 0x83, 0xe3, 0x8b, 0xcc, 0x82, 0xb9, 0xaf, 0xfc, 0x49, + 0xb9, 0xf8, 0xc0, 0xec, 0x47, 0xb7, 0x26, 0xbf, 0x03, 0xbe, 0x31, 0x4e, 0xc4, 0x67, 0x9c, 0x22, + 0x0c, 0xb2, 0x71, 0x34, 0xb4, 0x06, 0x83, 0xec, 0xf5, 0x85, 0x11, 0xa0, 0xe9, 0x1a, 0x4f, 0x61, + 0x7d, 0x4b, 0x66, 0x47, 0xf1, 0x7b, 0x51, 0x18, 0x60, 0xa5, 0x2e, 0x30, 0x88, 0x07, 0xc3, 0xcc, + 0xf2, 0xaa, 0xdd, 0x5f, 0xba, 0x1a, 0x70, 0x46, 0xdb, 0x66, 0x73, 0xa4, 0xbd, 0xc2, 0x65, 0xee, + 0xfa, 0x42, 0xee, 0x54, 0xf7, 0x59, 0x0c, 0xa5, 0x3f, 0xa0, 0xc3, 0x47, 0x09, 0xe0, 0xc2, 0x50, + 0xe7, 0x61, 0x4c, 0x95, 0x35, 0xa5, 0xad, 0x56, 0xe4, 0xb2, 0xf2, 0xbc, 0xc9, 0x82, 0xd8, 0x43, + 0xa5, 0x51, 0xa3, 0xb4, 0x88, 0x0b, 0x39, 0x25, 0x1c, 0xe4, 0x95, 0xf0, 0x14, 0x0c, 0xe2, 0x62, + 0xee, 0x92, 0x60, 0x40, 0x51, 0x6b, 0xc6, 0x9d, 0x2f, 0xae, 0x62, 0xdb, 0x1e, 0xbd, 0xb5, 0x1d, + 0x52, 0x4c, 0x9f, 0xe0, 0x14, 0x0c, 0xd6, 0x54, 0xa9, 0x49, 0x5e, 0xdf, 0xd0, 0x2b, 0xdb, 0x01, + 0xf2, 0x3b, 0x5f, 0x15, 0xff, 0x91, 0x00, 0xd3, 0x06, 0xa7, 0x4f, 0xd8, 0x72, 0xdd, 0x77, 0x58, + 0xae, 0xc0, 0x32, 0x67, 0xd8, 0xad, 0xaf, 0x0a, 0xa6, 0x2e, 0x1c, 0xe5, 0x5e, 0x73, 0xc3, 0x32, + 0x4f, 0x51, 0x02, 0x64, 0x25, 0xa8, 0x28, 0x7a, 0x19, 0xa7, 0xef, 0x0a, 0x80, 0xdc, 0xf5, 0x68, + 0x83, 0x37, 0x4d, 0xd7, 0x43, 0x4d, 0xf0, 0x82, 0x0d, 0x53, 0xca, 0xc4, 0xdf, 0xdd, 0x35, 0xfa, + 0x76, 0x04, 0x46, 0x6d, 0x8d, 0x3f, 0x73, 0x8f, 0x3a, 0xb8, 0x47, 0x9f, 0x87, 0xb8, 0x8d, 0x59, + 0x99, 0x6a, 0xd5, 0x65, 0x29, 0x43, 0x3a, 0x2d, 0x3b, 0x30, 0x69, 0x1b, 0x92, 0x3d, 0x21, 0x3c, + 0xe2, 0xa8, 0xf7, 0x1c, 0xa3, 0x52, 0xbf, 0x28, 0xf0, 0xa8, 0xe2, 0x1e, 0x8c, 0x19, 0xba, 0xaa, + 0x34, 0x64, 0x2f, 0x32, 0xbd, 0x36, 0x04, 0xe7, 0x3d, 0x6c, 0xd4, 0x7d, 0x0f, 0x3b, 0x05, 0x7d, + 0x35, 0x55, 0x69, 0xb7, 0x98, 0x30, 0xd0, 0x1f, 0xe2, 0xaf, 0x0b, 0x30, 0xcc, 0xcd, 0xe7, 0x78, + 0x5e, 0x28, 0x38, 0x9e, 0x17, 0xf6, 0x3a, 0xf7, 0x91, 0x0f, 0xe7, 0x26, 0xf8, 0x3e, 0x1e, 0xfc, + 0x6d, 0x98, 0xe0, 0xb0, 0xfb, 0x70, 0xda, 0x03, 0x32, 0x3e, 0xb2, 0x9e, 0xe2, 0x7a, 0x9e, 0xb4, + 0xb5, 0x5e, 0x73, 0x58, 0xeb, 0xa0, 0xdb, 0x1d, 0xa1, 0xca, 0xb0, 0xd8, 0xbf, 0x26, 0x40, 0xc2, + 0x03, 0x33, 0xb5, 0xda, 0x5d, 0x96, 0x2d, 0x9c, 0xcf, 0xb9, 0xe5, 0xf4, 0x39, 0x6f, 0x85, 0xc0, + 0xeb, 0x69, 0xd8, 0xff, 0x9d, 0x00, 0x33, 0xde, 0x6d, 0xd0, 0x16, 0x6f, 0xdc, 0x6f, 0x86, 0x9e, + 0xe8, 0x05, 0x1b, 0xf8, 0x43, 0x01, 0xe6, 0x6c, 0xea, 0x7d, 0xd2, 0xa2, 0x93, 0x73, 0x88, 0xce, + 0xb5, 0x80, 0x1c, 0x72, 0x1c, 0x53, 0xfe, 0x95, 0x00, 0x49, 0x4f, 0xdc, 0x27, 0x20, 0x3e, 0x25, + 0xa7, 0xf8, 0xbc, 0x1e, 0x0a, 0xb3, 0xa7, 0x00, 0xfd, 0xb6, 0x25, 0xfc, 0xee, 0xa3, 0x4b, 0x89, + 0x17, 0xa1, 0x5b, 0x3d, 0x4c, 0xf6, 0x82, 0x85, 0xe8, 0x77, 0x23, 0x30, 0xcc, 0x3d, 0xf2, 0x3e, + 0x72, 0x18, 0x29, 0xd3, 0x6a, 0xbd, 0xe4, 0x61, 0xa4, 0x4d, 0x18, 0x56, 0xea, 0xd5, 0x4a, 0xb9, + 0xa2, 0x34, 0x9f, 0xd6, 0x6b, 0x6c, 0xf3, 0x4f, 0x75, 0x3d, 0x64, 0xe6, 0xb3, 0x6b, 0x6b, 0xa4, + 0xc7, 0xc3, 0x57, 0x4a, 0x80, 0x07, 0xa0, 0xbf, 0x56, 0x47, 0x00, 0xa4, 0x56, 0x8b, 0x8d, 0x26, + 0x3e, 0x81, 0x09, 0x8e, 0x9b, 0x2c, 0xe8, 0xd8, 0x45, 0xa2, 0x29, 0xcb, 0x23, 0xae, 0x13, 0x5f, + 0x9f, 0xcf, 0x89, 0xef, 0x97, 0x63, 0x00, 0x16, 0x1c, 0x74, 0x16, 0x46, 0x55, 0xb9, 0x5a, 0x57, + 0xf1, 0xf0, 0x6d, 0xb5, 0x6e, 0x78, 0x76, 0x23, 0x46, 0xe1, 0x23, 0xb5, 0xae, 0xa1, 0xc7, 0xe4, + 0x84, 0x42, 0xec, 0x02, 0xf9, 0xa2, 0x40, 0x4b, 0x44, 0x96, 0xa2, 0x41, 0x3c, 0x58, 0x3c, 0x91, + 0x61, 0x51, 0xc8, 0x89, 0x67, 0x54, 0xe5, 0x7e, 0x69, 0xa8, 0x00, 0xc3, 0xf4, 0x08, 0x42, 0x47, + 0x8d, 0x92, 0x51, 0xaf, 0x05, 0x19, 0x75, 0x1d, 0x77, 0x23, 0x43, 0x42, 0xcd, 0xf8, 0x53, 0x43, + 0xef, 0x41, 0x5c, 0xb2, 0x18, 0x48, 0xbf, 0x7e, 0x88, 0x11, 0xd1, 0x7b, 0x35, 0xc8, 0xa0, 0x1c, + 0xf3, 0xc9, 0xd0, 0xe3, 0x92, 0xbd, 0x00, 0x3b, 0x9b, 0x95, 0x46, 0x5d, 0xa6, 0x67, 0x26, 0xe6, + 0x6c, 0xd2, 0x82, 0x7c, 0x15, 0xb3, 0x92, 0x55, 0x6a, 0x72, 0x45, 0x95, 0x75, 0x16, 0x68, 0x1c, + 0xa1, 0x85, 0xdb, 0xa4, 0x0c, 0xfd, 0x34, 0xc4, 0xa5, 0xb6, 0xbe, 0x5b, 0xa6, 0x6a, 0x45, 0x11, + 0x0e, 0x04, 0x8c, 0x54, 0x60, 0x84, 0x6d, 0x9d, 0x69, 0x26, 0x01, 0x38, 0x26, 0xd9, 0x7e, 0xa3, + 0x37, 0xe0, 0x54, 0x4b, 0xa1, 0x8f, 0x90, 0x95, 0xb6, 0x5e, 0xb6, 0xaf, 0xec, 0x20, 0x59, 0xd9, + 0x19, 0xdc, 0x60, 0x83, 0xd4, 0x97, 0xb8, 0x35, 0x16, 0xbf, 0x11, 0x83, 0x69, 0x07, 0x0f, 0x58, + 0x64, 0xbe, 0x8b, 0x00, 0x76, 0x09, 0x31, 0xb8, 0x25, 0x2c, 0x1a, 0x48, 0xc2, 0x62, 0x27, 0x22, + 0x61, 0x7d, 0x27, 0x21, 0x61, 0xfd, 0xc7, 0x28, 0x61, 0x2f, 0xad, 0x7c, 0x7c, 0x33, 0x06, 0x71, + 0xcb, 0x6e, 0x04, 0xb3, 0x4d, 0xe7, 0x61, 0x8c, 0x67, 0x96, 0x69, 0xa7, 0x46, 0xb9, 0x52, 0xaa, + 0x38, 0x9f, 0x49, 0xc8, 0x8f, 0xbe, 0x84, 0xbc, 0x0a, 0x23, 0x6b, 0xbc, 0xa9, 0x73, 0xd9, 0x43, + 0xc1, 0x6d, 0x0f, 0xc9, 0xf9, 0x85, 0x23, 0xf9, 0xa5, 0x3b, 0xbf, 0x70, 0xd8, 0x6c, 0xe7, 0x17, + 0x0f, 0xcc, 0x2f, 0xc5, 0xf9, 0xc5, 0x85, 0xcb, 0xe3, 0xfc, 0xe2, 0xdd, 0x26, 0xe4, 0xf9, 0xc5, + 0x35, 0xc8, 0x0b, 0x76, 0x3d, 0xff, 0x6d, 0x14, 0x46, 0x98, 0x03, 0x4c, 0xf4, 0x30, 0xe4, 0xe7, + 0x85, 0xe8, 0x1c, 0x8c, 0x11, 0xa5, 0x95, 0xab, 0x65, 0x16, 0x56, 0xa5, 0xc3, 0x8f, 0xb0, 0xd2, + 0x22, 0x89, 0xae, 0x5e, 0x82, 0x38, 0xdf, 0x8a, 0x0b, 0x41, 0x8d, 0x59, 0xed, 0x48, 0x60, 0xe0, + 0x2a, 0x20, 0xbe, 0x25, 0x0b, 0xba, 0x52, 0x1f, 0x21, 0x6e, 0xb5, 0x65, 0xb1, 0xd7, 0x05, 0x00, + 0x55, 0x69, 0xc8, 0x64, 0x40, 0x23, 0x3a, 0x35, 0x84, 0x4b, 0xf0, 0x58, 0x1a, 0x5a, 0x37, 0xfc, + 0x66, 0xaa, 0xd8, 0x37, 0x02, 0x9e, 0x04, 0x08, 0x23, 0x3a, 0x3b, 0xd0, 0x83, 0x47, 0x73, 0xa0, + 0x87, 0xc2, 0xbe, 0x25, 0x30, 0x96, 0x80, 0xff, 0x70, 0x88, 0x95, 0x91, 0x77, 0xec, 0x1f, 0x98, + 0x71, 0x46, 0x02, 0x3e, 0x98, 0xcb, 0xe1, 0x5e, 0xbb, 0x88, 0xc7, 0xda, 0xd9, 0x79, 0x1c, 0x75, + 0xf0, 0x58, 0x7c, 0x62, 0x9f, 0xb9, 0x37, 0x6f, 0xbb, 0xcb, 0x1c, 0xf7, 0xcd, 0x10, 0x18, 0x99, + 0x23, 0x9f, 0x0d, 0x39, 0xbe, 0xb8, 0x04, 0x63, 0xeb, 0x94, 0x26, 0x63, 0x00, 0xe7, 0x35, 0xff, + 0xaf, 0x5a, 0xe7, 0x61, 0xba, 0xfc, 0x27, 0x6c, 0x41, 0xb3, 0x0e, 0x0b, 0x7a, 0x35, 0x8c, 0x6c, + 0x9a, 0x26, 0x74, 0xd7, 0x8c, 0x5a, 0xd9, 0x40, 0x1f, 0xbf, 0x09, 0x15, 0xd3, 0x30, 0xcb, 0xcf, + 0xd4, 0x3d, 0x9a, 0xfd, 0xcf, 0x23, 0x76, 0xc1, 0xf8, 0x2c, 0xa4, 0xdd, 0x35, 0xa4, 0xfd, 0x17, + 0xad, 0xeb, 0x22, 0x8e, 0x65, 0x99, 0x6a, 0xb5, 0xdb, 0x52, 0xf2, 0x57, 0x50, 0x11, 0xdb, 0x15, + 0x14, 0xcf, 0xef, 0xa8, 0x77, 0xb0, 0x3a, 0xc6, 0xaf, 0xda, 0x97, 0xad, 0xb0, 0x0a, 0x07, 0x81, + 0x05, 0xc2, 0x5f, 0x18, 0x8a, 0x3d, 0x2f, 0x10, 0x2c, 0x9a, 0x7b, 0xfc, 0x20, 0xc4, 0x7f, 0x2d, + 0xc0, 0x92, 0x7b, 0xbe, 0x93, 0xb6, 0x00, 0x3f, 0xe1, 0xb0, 0x00, 0x2b, 0x61, 0x2c, 0x80, 0x23, + 0x9a, 0xf7, 0x03, 0x01, 0x4e, 0xfb, 0x53, 0x10, 0xc8, 0x1c, 0x74, 0x60, 0x9c, 0x45, 0x7a, 0xd4, + 0x9b, 0xf4, 0x18, 0x4f, 0xfa, 0x63, 0xe7, 0x77, 0x86, 0x6f, 0x86, 0x27, 0xcc, 0xd3, 0xe7, 0xfa, + 0x4f, 0x02, 0x2c, 0x74, 0x6c, 0x8a, 0x1e, 0xf3, 0xae, 0xd7, 0xdd, 0x5e, 0xa7, 0x7d, 0xc1, 0x1e, + 0xd8, 0xdf, 0x8c, 0xd1, 0xcf, 0x8b, 0xbc, 0xdd, 0x2f, 0xdf, 0xcb, 0x26, 0xeb, 0x1e, 0x3b, 0xca, + 0xdf, 0x63, 0xdb, 0x57, 0x39, 0xe6, 0x5c, 0x65, 0xfb, 0x46, 0xdb, 0xe7, 0x74, 0x98, 0xb2, 0x86, + 0xc3, 0x44, 0x4f, 0x5a, 0xcb, 0x41, 0xbe, 0x2b, 0x0c, 0xe0, 0x2d, 0x0d, 0x1c, 0xcd, 0x5b, 0x1a, + 0x0c, 0x65, 0x86, 0x3b, 0x7d, 0xef, 0xe7, 0xd8, 0x32, 0xa0, 0xe3, 0x96, 0x31, 0xec, 0xde, 0x32, + 0xe8, 0x26, 0x34, 0xc2, 0x6f, 0x42, 0xfc, 0xc3, 0x81, 0xd1, 0x4e, 0x0f, 0x07, 0xc6, 0x9c, 0x0f, + 0x07, 0x9c, 0x6e, 0xdd, 0xb8, 0xdb, 0xad, 0xfb, 0x12, 0xfd, 0xce, 0x96, 0xf7, 0xe9, 0x7c, 0x37, + 0x50, 0x4b, 0x20, 0x22, 0xfe, 0x02, 0x11, 0xed, 0x2c, 0x10, 0x31, 0xa7, 0xe7, 0xf5, 0x2e, 0x07, + 0x80, 0xb9, 0x76, 0xbe, 0x00, 0x42, 0x3a, 0x75, 0xb7, 0xe8, 0xe7, 0x67, 0x86, 0x43, 0x16, 0x74, + 0x58, 0xf1, 0xa7, 0x4d, 0xbf, 0x82, 0xef, 0xde, 0xc5, 0xba, 0xf9, 0xaa, 0x11, 0x1d, 0x3d, 0x6a, + 0x8e, 0xfe, 0x25, 0xf3, 0x5e, 0xca, 0x49, 0xf7, 0x31, 0xcd, 0xd0, 0x8d, 0xe3, 0x0d, 0xbb, 0xa3, + 0xc5, 0xd3, 0x78, 0x09, 0xe2, 0x06, 0x02, 0xd3, 0x54, 0x53, 0x1c, 0x63, 0x2d, 0xde, 0x3d, 0x0e, + 0x41, 0xee, 0x77, 0xad, 0xeb, 0x2b, 0xfb, 0x74, 0x3d, 0x4a, 0x9b, 0x17, 0xc4, 0xa8, 0x27, 0xc4, + 0x0b, 0x6e, 0x43, 0xc5, 0xf2, 0x5c, 0xc4, 0x85, 0xe0, 0x16, 0x4b, 0xfc, 0x45, 0x3f, 0x02, 0xd8, + 0xaa, 0x1d, 0x3f, 0xcf, 0xba, 0x2d, 0xe0, 0xc7, 0x02, 0xcc, 0x5a, 0x76, 0xf1, 0x65, 0x7b, 0xb0, + 0x68, 0x22, 0x33, 0x7d, 0x87, 0xbf, 0x2e, 0xc0, 0x8c, 0x0b, 0x6f, 0x2f, 0x4f, 0x7f, 0x0a, 0xce, + 0xa7, 0x3f, 0x37, 0x83, 0x6f, 0x1f, 0x5e, 0xfb, 0xfd, 0xef, 0x0a, 0x30, 0xe5, 0xd5, 0x22, 0xe4, + 0xcb, 0x44, 0xc7, 0x10, 0x1e, 0xbb, 0x7b, 0xe1, 0x28, 0xbb, 0xbb, 0x31, 0x58, 0xe2, 0x95, 0x2e, + 0xfb, 0xfc, 0xbf, 0xb4, 0xdc, 0x17, 0x1f, 0x76, 0x1f, 0x6b, 0xcc, 0x2b, 0xfc, 0x3b, 0xd1, 0xae, + 0xab, 0x21, 0x7a, 0x2a, 0x9a, 0x9d, 0x86, 0xe0, 0xfa, 0xf6, 0xc3, 0x25, 0xe7, 0x17, 0x22, 0x30, + 0x93, 0x69, 0xeb, 0xbb, 0x47, 0x96, 0xfa, 0x8a, 0x4f, 0x22, 0x8f, 0xae, 0x72, 0xe9, 0x98, 0x3d, + 0x64, 0x36, 0x8f, 0x82, 0xd3, 0xcb, 0xbe, 0x19, 0x72, 0x3e, 0x0f, 0x65, 0xf3, 0x6a, 0x11, 0x52, + 0xd9, 0x3a, 0x12, 0xf5, 0x02, 0x95, 0x0d, 0x1b, 0x61, 0xd7, 0xf2, 0xbe, 0x34, 0x46, 0xd8, 0x44, + 0x66, 0x1a, 0xe1, 0x3d, 0x18, 0x32, 0x0b, 0x31, 0x10, 0xb2, 0x9b, 0xda, 0x9f, 0x89, 0xcf, 0x83, + 0x65, 0x0b, 0xdc, 0x71, 0xd8, 0x19, 0x60, 0xdb, 0x55, 0x90, 0x03, 0x76, 0xea, 0x9f, 0x09, 0xf4, + 0xcc, 0x41, 0xdc, 0x76, 0x74, 0x0a, 0xa6, 0x1f, 0x6d, 0xe7, 0x4a, 0xdb, 0x3b, 0x99, 0x9d, 0x5c, + 0xf9, 0x51, 0x61, 0x7b, 0x2b, 0xb7, 0x96, 0x7f, 0x90, 0xcf, 0x65, 0xe3, 0xaf, 0xa0, 0x29, 0x88, + 0x5b, 0x55, 0x99, 0xb5, 0x9d, 0xfc, 0x3b, 0xb9, 0xb8, 0x80, 0x66, 0x00, 0x59, 0xa5, 0xf9, 0x02, + 0x2b, 0x8f, 0xa0, 0x69, 0x98, 0xb0, 0xca, 0xb3, 0xb9, 0x8d, 0xdc, 0x4e, 0x2e, 0x1b, 0x8f, 0xda, + 0x07, 0xd9, 0x28, 0xae, 0xbd, 0x9d, 0xcb, 0xc6, 0x63, 0xf6, 0xc6, 0xdb, 0x8f, 0xb6, 0xb7, 0x72, + 0x85, 0x6c, 0xbc, 0xcf, 0x5e, 0x9c, 0x2f, 0xe4, 0x77, 0xf2, 0x99, 0x8d, 0x78, 0x7f, 0xea, 0xcf, + 0x41, 0x3f, 0x4d, 0x36, 0x81, 0x27, 0x5f, 0xcf, 0x15, 0xb2, 0xb9, 0x92, 0x03, 0xea, 0x04, 0x8c, + 0xb2, 0xf2, 0x07, 0xb9, 0xcd, 0xcc, 0x06, 0xc6, 0x39, 0x0e, 0xc3, 0xac, 0x88, 0x14, 0x44, 0x10, + 0x82, 0x31, 0x56, 0x90, 0xcd, 0xbf, 0x93, 0x2b, 0x6d, 0xe7, 0xe2, 0xd1, 0xd4, 0xff, 0x13, 0x60, + 0xd4, 0x96, 0x8e, 0x06, 0x2d, 0xc0, 0x29, 0x02, 0x21, 0x97, 0x29, 0xad, 0x3d, 0x7c, 0x3b, 0xf7, + 0xae, 0x63, 0xa2, 0x39, 0x98, 0x75, 0x54, 0x6f, 0xe7, 0x4a, 0xe5, 0x42, 0x66, 0x13, 0x4f, 0x39, + 0x0f, 0x09, 0x7b, 0xe5, 0x83, 0x7c, 0x69, 0x7b, 0x87, 0xd6, 0x46, 0xdc, 0x5d, 0x37, 0x32, 0x46, + 0x65, 0xd4, 0x5d, 0x59, 0xc8, 0xaf, 0xbd, 0x4d, 0x2b, 0x63, 0x68, 0x11, 0x92, 0xf6, 0xca, 0x6c, + 0x7e, 0x7b, 0x6b, 0x23, 0xf3, 0x2e, 0xad, 0xef, 0x43, 0xb3, 0x30, 0x69, 0xaf, 0xcf, 0x6d, 0x66, + 0xf2, 0x1b, 0xf1, 0x7e, 0x77, 0x05, 0xe1, 0x6c, 0x7c, 0x20, 0xf5, 0x33, 0x30, 0xc2, 0xab, 0x16, + 0x6e, 0x48, 0x1b, 0x6d, 0xe6, 0x76, 0x1e, 0x16, 0xb3, 0xe5, 0xdc, 0xe7, 0x1f, 0x65, 0x36, 0xb6, + 0xe3, 0xaf, 0x60, 0x92, 0x6c, 0x15, 0xdb, 0x3b, 0x99, 0xd2, 0xce, 0x76, 0xf9, 0x71, 0x7e, 0xe7, + 0x61, 0x5c, 0xc0, 0xc2, 0x63, 0xab, 0x5d, 0x2b, 0x16, 0x76, 0x32, 0xf9, 0xc2, 0x76, 0x3c, 0x92, + 0xca, 0xc2, 0x00, 0xcb, 0x14, 0x80, 0x07, 0xdf, 0x7c, 0x90, 0xd9, 0x79, 0x77, 0xcb, 0x29, 0x60, + 0xe3, 0x30, 0x6c, 0x54, 0x6c, 0x6f, 0x6e, 0xd3, 0x35, 0x33, 0x0a, 0x8a, 0x3b, 0x5b, 0xf1, 0x48, + 0xea, 0x29, 0x0c, 0x1a, 0x19, 0x03, 0x50, 0x02, 0xa6, 0xf0, 0xdf, 0x1e, 0x82, 0x3a, 0x03, 0xc8, + 0xac, 0x29, 0x14, 0x77, 0xca, 0xa5, 0x5c, 0x26, 0xfb, 0x6e, 0x5c, 0xc0, 0x2b, 0x6e, 0x96, 0xd3, + 0xb2, 0x08, 0x96, 0x47, 0xae, 0x6c, 0xb3, 0xf8, 0x0e, 0x96, 0xd2, 0xd4, 0x43, 0x88, 0x3b, 0x3f, + 0xcc, 0x47, 0x49, 0x98, 0x29, 0x14, 0x77, 0xf2, 0x0f, 0xf2, 0x6b, 0x99, 0x9d, 0x7c, 0xb1, 0x40, + 0x50, 0x51, 0xc6, 0xbe, 0x82, 0xb1, 0xb8, 0xea, 0x08, 0x09, 0xa9, 0x36, 0x0c, 0x73, 0xdf, 0x23, + 0xe2, 0x75, 0xdd, 0x2a, 0x6e, 0xe4, 0xd7, 0xde, 0xf5, 0xc1, 0xcd, 0x57, 0x9a, 0x2a, 0x96, 0x80, + 0x29, 0xbe, 0x9c, 0x53, 0xb2, 0x59, 0x98, 0xe4, 0x6b, 0x4c, 0x35, 0x4b, 0x6d, 0xc1, 0xa0, 0xf1, + 0xfd, 0x18, 0xee, 0x5e, 0x2c, 0xad, 0x7b, 0x4d, 0x38, 0x09, 0xe3, 0x66, 0x8d, 0x39, 0xdb, 0x34, + 0x4c, 0x98, 0x85, 0xd6, 0x54, 0xa9, 0xdf, 0x10, 0x00, 0xb9, 0x3f, 0xec, 0x40, 0x22, 0x2c, 0x16, + 0x4b, 0xeb, 0x9b, 0xb9, 0xcd, 0x55, 0x7f, 0x25, 0x39, 0x03, 0x0b, 0x1e, 0x6d, 0x38, 0x65, 0x10, + 0xd0, 0x12, 0xcc, 0x7b, 0x34, 0xb1, 0x34, 0x22, 0x82, 0x25, 0xcf, 0xa3, 0x05, 0x5d, 0x80, 0x28, + 0x56, 0x09, 0x2f, 0x18, 0x58, 0x19, 0xf3, 0xd9, 0x78, 0x2c, 0x25, 0x99, 0x37, 0x5b, 0x94, 0x27, + 0xf3, 0x90, 0xd8, 0x2a, 0x15, 0x7f, 0x22, 0xb7, 0xb6, 0xe3, 0xc5, 0x17, 0xcc, 0x56, 0xbe, 0xd6, + 0xe4, 0x4d, 0x12, 0x66, 0x8c, 0x0a, 0x17, 0x83, 0x1e, 0x99, 0x6f, 0x65, 0x0d, 0x29, 0x67, 0x4d, + 0x99, 0xa4, 0xbf, 0x5d, 0x28, 0x3e, 0x2e, 0x50, 0x33, 0xca, 0x57, 0x6c, 0xe7, 0x36, 0x1e, 0xc4, + 0x05, 0x67, 0xf3, 0xf5, 0x52, 0xa6, 0x80, 0x57, 0x32, 0x92, 0x7a, 0x6c, 0xbe, 0x6d, 0xb6, 0x98, + 0xbe, 0x04, 0xf3, 0x06, 0x0c, 0x7f, 0x96, 0xbb, 0x5a, 0xb0, 0x02, 0xc6, 0xf2, 0xd4, 0x81, 0xf5, + 0xc8, 0xdf, 0xf6, 0x62, 0x12, 0x9d, 0x83, 0x25, 0xd6, 0xb4, 0x54, 0xdc, 0xc8, 0xf9, 0xcd, 0xb0, + 0x00, 0xa7, 0x3c, 0x5b, 0xb1, 0x05, 0x3d, 0x0f, 0x67, 0x3c, 0xab, 0x6d, 0xa6, 0x2a, 0x92, 0xfa, + 0xbe, 0xf5, 0xf6, 0xd3, 0x29, 0x59, 0x17, 0x40, 0x64, 0x23, 0x74, 0x96, 0x2e, 0x6b, 0xa6, 0x8e, + 0x12, 0x66, 0x51, 0xd5, 0x49, 0xca, 0x2c, 0xce, 0xfa, 0x49, 0x9a, 0x08, 0x8b, 0x7e, 0xb0, 0x4c, + 0x69, 0xdb, 0x82, 0x41, 0xe3, 0xd9, 0x1d, 0xd6, 0xbe, 0xcc, 0xd6, 0x96, 0x8f, 0xf6, 0x99, 0x35, + 0xbc, 0xf6, 0x99, 0x85, 0x9c, 0x70, 0x7d, 0x81, 0xbe, 0x14, 0xe1, 0x1f, 0x5d, 0x60, 0x6b, 0x4b, + 0xca, 0x72, 0xdb, 0x5b, 0xc5, 0xc2, 0x76, 0x8e, 0xc8, 0xcd, 0x5a, 0x31, 0x9b, 0xa3, 0x8b, 0xe3, + 0xaa, 0xca, 0x67, 0xcb, 0x3b, 0xc5, 0xb7, 0x73, 0x85, 0xb8, 0x80, 0xce, 0xc2, 0x69, 0x57, 0x35, + 0xa9, 0xb3, 0x1a, 0x45, 0x52, 0x2a, 0x8c, 0xda, 0x5e, 0x64, 0x60, 0x0e, 0x92, 0x02, 0x2c, 0x9a, + 0xa4, 0x4b, 0xe6, 0xd1, 0xce, 0xc3, 0x62, 0x29, 0xff, 0x93, 0xc4, 0xe6, 0x19, 0x53, 0x27, 0x61, + 0xc6, 0xde, 0x2a, 0xbf, 0xb9, 0xb5, 0x91, 0x5f, 0xcb, 0xef, 0xc4, 0x05, 0x74, 0x1a, 0xe6, 0xec, + 0x75, 0xa5, 0xdc, 0x83, 0x52, 0x6e, 0xfb, 0xa1, 0x39, 0xe7, 0x33, 0x98, 0xf4, 0x78, 0xb0, 0x81, + 0xad, 0x26, 0x29, 0xde, 0xc2, 0x23, 0x59, 0x16, 0xf6, 0x71, 0x6e, 0x35, 0xfe, 0x0a, 0xb1, 0x40, + 0x1e, 0x95, 0x64, 0x35, 0x32, 0xeb, 0xb9, 0x02, 0x9e, 0x18, 0x9b, 0x07, 0x8f, 0x36, 0x85, 0x0c, + 0x63, 0x6f, 0x03, 0x90, 0xfb, 0x21, 0x07, 0x31, 0x39, 0xb8, 0xf4, 0xd1, 0x0e, 0xdb, 0xd0, 0x48, + 0xa7, 0xd5, 0xcc, 0x76, 0x7e, 0x8d, 0x6e, 0xfd, 0x1e, 0xb5, 0x5b, 0xc5, 0x6d, 0x3c, 0xa1, 0x77, + 0x65, 0xa1, 0x58, 0xc0, 0xb3, 0x95, 0x61, 0xca, 0xeb, 0xaa, 0x1f, 0x33, 0x98, 0x43, 0xb8, 0x9d, + 0x2b, 0x65, 0x7c, 0x54, 0xdb, 0xd6, 0xca, 0x10, 0xbf, 0xcc, 0xd6, 0x96, 0xa1, 0xda, 0xba, 0xf9, + 0xf4, 0xdd, 0x0a, 0xc8, 0x72, 0x26, 0x81, 0xf0, 0xdf, 0x4b, 0x22, 0x2d, 0xab, 0xc8, 0x35, 0x31, + 0x45, 0x73, 0x11, 0x92, 0xee, 0x5a, 0x4e, 0x46, 0xff, 0xc8, 0x11, 0x7e, 0x71, 0x2a, 0xf4, 0x15, + 0xb8, 0xc8, 0xf7, 0xef, 0xac, 0xd5, 0x29, 0xb8, 0xd0, 0xa9, 0xb1, 0x4d, 0xb5, 0x2f, 0xc3, 0xf9, + 0x4e, 0x6d, 0x79, 0xfd, 0xb6, 0x8c, 0x85, 0x67, 0x53, 0x43, 0xc9, 0x2f, 0xc2, 0xd9, 0x8e, 0x50, + 0x4d, 0x4d, 0xdf, 0x85, 0x31, 0x7b, 0xdc, 0xdb, 0x70, 0xce, 0x7c, 0x79, 0xcc, 0x1c, 0x6c, 0x2f, + 0x06, 0x33, 0xa7, 0xcf, 0x9b, 0xbb, 0x5f, 0x67, 0xc9, 0x0a, 0xed, 0x27, 0x2a, 0x2c, 0xfd, 0x56, + 0x1f, 0xff, 0xcd, 0xc0, 0xa3, 0x8d, 0xb1, 0x1d, 0xe4, 0xb3, 0x74, 0x6d, 0xbd, 0x86, 0x61, 0x74, + 0x46, 0x0c, 0x37, 0xd8, 0x51, 0x5f, 0x2c, 0xad, 0xe3, 0xea, 0x28, 0x01, 0xe7, 0x3e, 0xee, 0x61, + 0x70, 0x58, 0x03, 0x3a, 0x82, 0x5b, 0x80, 0x53, 0x1e, 0x6d, 0xd8, 0xc8, 0x02, 0x91, 0x76, 0x77, + 0x35, 0x87, 0x3d, 0x82, 0xb1, 0x7b, 0xcd, 0xc2, 0xb0, 0x47, 0x57, 0xbe, 0xfa, 0x35, 0x01, 0x26, + 0x36, 0xcd, 0x83, 0xd7, 0xb6, 0xac, 0x3e, 0xab, 0x57, 0x64, 0xf4, 0x36, 0x0c, 0x3c, 0x94, 0xa5, + 0x86, 0xbe, 0xfb, 0x45, 0x34, 0xe3, 0xba, 0x4e, 0xc8, 0xed, 0xb5, 0xf4, 0xfd, 0xa4, 0x4f, 0xb9, + 0x18, 0x3f, 0xf8, 0xfe, 0x7f, 0xff, 0x5a, 0x04, 0xd0, 0x60, 0x7a, 0x97, 0x8d, 0xb0, 0x0e, 0x7d, + 0x25, 0x59, 0xaa, 0xee, 0x87, 0x1e, 0x6a, 0x8c, 0x0c, 0x35, 0x88, 0xfa, 0xd3, 0x2a, 0xe9, 0x5f, + 0x80, 0xc1, 0x77, 0x58, 0x5e, 0x77, 0xdf, 0xb1, 0xfc, 0xb2, 0x84, 0x8b, 0x13, 0x64, 0xb0, 0x61, + 0x34, 0x64, 0xe6, 0x86, 0x47, 0x5f, 0x82, 0xe1, 0x75, 0x99, 0x04, 0x68, 0x56, 0xf7, 0xf3, 0x59, + 0x74, 0x21, 0x48, 0xa4, 0x24, 0x9f, 0x4d, 0x06, 0x4a, 0x51, 0x29, 0x8a, 0x07, 0x87, 0x89, 0x61, + 0x7a, 0xc5, 0xb2, 0x8c, 0xe1, 0x93, 0xe9, 0x47, 0xd1, 0x70, 0x1a, 0x97, 0x68, 0xe9, 0x0f, 0xeb, + 0xd5, 0x8f, 0xd0, 0x37, 0x04, 0x98, 0x32, 0x11, 0x90, 0x5c, 0x7a, 0xeb, 0x0d, 0xe5, 0x89, 0xd4, + 0x40, 0x57, 0x82, 0x4c, 0xc1, 0x72, 0x8e, 0x07, 0xc4, 0xb3, 0xe2, 0x85, 0x67, 0x01, 0xcd, 0xa5, + 0x6b, 0x64, 0x4a, 0x06, 0x8b, 0xdc, 0xd5, 0xa4, 0x3f, 0x24, 0xff, 0x7c, 0x84, 0xfe, 0x96, 0x00, + 0xc3, 0x54, 0x62, 0xf1, 0x10, 0x1a, 0xba, 0x11, 0x3c, 0x5d, 0x29, 0x0b, 0x12, 0x25, 0x57, 0xc2, + 0x74, 0xa1, 0x1b, 0xb8, 0x78, 0xc9, 0x0b, 0xea, 0xa4, 0x38, 0xc6, 0x30, 0x96, 0x35, 0xd2, 0xfc, + 0x8e, 0x90, 0xc2, 0x00, 0x47, 0xf2, 0x1a, 0x1e, 0x82, 0xa6, 0x35, 0x0f, 0x80, 0xd0, 0x99, 0x87, + 0x3d, 0x00, 0x42, 0x57, 0x6a, 0x75, 0xf1, 0xa2, 0x17, 0x42, 0x84, 0xe2, 0x06, 0xc2, 0xba, 0x46, + 0xd3, 0xae, 0xa3, 0x9f, 0x13, 0x00, 0xac, 0x34, 0xeb, 0xdd, 0xe1, 0xb9, 0x52, 0xb2, 0x07, 0x5c, + 0xdd, 0x33, 0x07, 0x87, 0x89, 0x11, 0x00, 0x02, 0xe8, 0xb9, 0x5a, 0xd7, 0x65, 0x2a, 0xed, 0x62, + 0x3f, 0x45, 0x84, 0x79, 0xf5, 0x55, 0x01, 0xc6, 0xb2, 0xb2, 0x54, 0xd1, 0xeb, 0xcf, 0x0c, 0x38, + 0xc7, 0x2b, 0xf1, 0x2b, 0x9e, 0x18, 0xe6, 0x93, 0xb3, 0x9c, 0xc8, 0xa7, 0xcb, 0x55, 0x13, 0x82, + 0x01, 0xaa, 0xf4, 0xc3, 0x07, 0xa5, 0xda, 0x40, 0xfd, 0x25, 0x01, 0x06, 0x37, 0x94, 0xca, 0xfb, + 0x27, 0x00, 0xe7, 0xaa, 0x27, 0x9c, 0x99, 0xe4, 0x84, 0x0d, 0x4e, 0x43, 0xa9, 0xbc, 0x8f, 0x81, + 0xfc, 0xbc, 0x00, 0xf0, 0xa8, 0xd9, 0x38, 0x19, 0x28, 0xcb, 0x9e, 0x50, 0x12, 0xc9, 0x49, 0x1b, + 0x94, 0x76, 0xd3, 0x00, 0xa3, 0x02, 0x64, 0xe5, 0x86, 0x1c, 0x72, 0x95, 0xfc, 0x6c, 0xfb, 0xb9, + 0x83, 0xc3, 0xc4, 0x28, 0x0c, 0x93, 0xd9, 0xab, 0x64, 0x58, 0x6a, 0x20, 0x53, 0x36, 0x03, 0xf9, + 0x15, 0x96, 0x7b, 0xd3, 0xf8, 0x0f, 0x32, 0xae, 0x05, 0xfc, 0xff, 0x30, 0x98, 0xee, 0x5c, 0x0c, + 0xd6, 0x5c, 0x13, 0x53, 0x5e, 0xfa, 0x3c, 0x8d, 0x6c, 0xac, 0x30, 0xfe, 0x8b, 0x8d, 0x7f, 0x80, + 0xf7, 0x73, 0xee, 0xab, 0x85, 0x13, 0x86, 0xf6, 0xfa, 0xc1, 0x61, 0x02, 0x99, 0x97, 0x05, 0xcb, + 0x52, 0xab, 0x65, 0x21, 0x9c, 0x47, 0xc9, 0x34, 0xf7, 0x5e, 0xdb, 0x01, 0xf4, 0xaf, 0x0a, 0x00, + 0x45, 0xb5, 0x76, 0xd2, 0x00, 0xb1, 0xb5, 0x06, 0x72, 0xb9, 0x6f, 0x01, 0x9b, 0x42, 0x28, 0xad, + 0xa8, 0x35, 0x07, 0xa0, 0xaf, 0x0b, 0xe6, 0xfb, 0xc4, 0x93, 0x06, 0x75, 0xfd, 0xe0, 0x30, 0x31, + 0x66, 0xbe, 0x1b, 0xb0, 0x80, 0x25, 0xd0, 0x4c, 0xda, 0x48, 0x1e, 0x61, 0x07, 0xf7, 0x15, 0x01, + 0xc6, 0xd8, 0x5e, 0x6c, 0x64, 0x93, 0x0e, 0x2a, 0xe3, 0x81, 0x76, 0x6b, 0x36, 0x68, 0x20, 0x51, + 0x6b, 0x31, 0x00, 0xff, 0x58, 0x80, 0x09, 0x57, 0xd6, 0x65, 0xd4, 0xf5, 0xab, 0x40, 0xbf, 0x44, + 0xcd, 0xe1, 0x80, 0x06, 0xb2, 0x0f, 0x0c, 0x29, 0xb6, 0x0f, 0x7f, 0x59, 0x80, 0x11, 0xc6, 0x40, + 0x9a, 0xd8, 0x38, 0x28, 0xfb, 0x2e, 0x07, 0x76, 0x76, 0x7c, 0x3c, 0x03, 0x64, 0xb3, 0x9e, 0xf4, + 0xb9, 0xc9, 0xb7, 0x04, 0x18, 0xa7, 0xc2, 0x60, 0x01, 0xba, 0x15, 0x9c, 0x71, 0x7c, 0xd6, 0xe4, + 0x30, 0x00, 0x03, 0xd9, 0x77, 0x82, 0x10, 0xb3, 0xec, 0x9b, 0x02, 0xcc, 0x95, 0x64, 0x4d, 0x6e, + 0x56, 0xb9, 0x44, 0xca, 0x54, 0x97, 0x37, 0xc3, 0x70, 0xd0, 0xcf, 0xc8, 0xbe, 0xe5, 0x89, 0x26, + 0x25, 0x9e, 0x77, 0xa1, 0xc1, 0x5b, 0x20, 0xc6, 0xf1, 0x8c, 0x83, 0xe0, 0x58, 0x54, 0x9a, 0xd6, + 0xf9, 0x58, 0x17, 0x95, 0x0c, 0x19, 0x68, 0x51, 0x69, 0xda, 0x66, 0xfb, 0xa2, 0x52, 0x40, 0x21, + 0x16, 0x95, 0xcf, 0x19, 0x1d, 0x06, 0x60, 0xa0, 0x45, 0x25, 0x08, 0xed, 0x8b, 0xca, 0xe5, 0x91, + 0x66, 0x7b, 0x85, 0x52, 0x95, 0x5f, 0xcc, 0xa2, 0x12, 0x34, 0x7e, 0x8b, 0xca, 0x99, 0x3a, 0x23, + 0xa9, 0xf5, 0xb1, 0x9a, 0x3a, 0x23, 0x1d, 0x73, 0x10, 0x53, 0xc7, 0x32, 0x3b, 0x3b, 0x4c, 0x9d, + 0x01, 0x2b, 0x84, 0xa9, 0xb3, 0xa7, 0xb8, 0x0e, 0x07, 0x34, 0x90, 0xa9, 0x63, 0x48, 0x31, 0x03, + 0xff, 0x8a, 0x60, 0x9e, 0x1c, 0x37, 0x9f, 0x4a, 0xc1, 0xb9, 0x77, 0x35, 0x44, 0x06, 0x6a, 0xad, + 0xdb, 0x21, 0x83, 0x80, 0xda, 0xc3, 0xd3, 0xff, 0x53, 0x01, 0xe6, 0xb6, 0xe5, 0x66, 0xd5, 0x27, + 0x1b, 0x33, 0xba, 0xd7, 0xfd, 0xea, 0xb8, 0x53, 0x1a, 0x67, 0x5f, 0x49, 0xbc, 0xed, 0xc9, 0xb6, + 0x33, 0xe2, 0xbc, 0xcd, 0x83, 0xc4, 0x12, 0xa8, 0xc9, 0x7a, 0xeb, 0x79, 0x13, 0x0f, 0xbd, 0x8f, + 0xf9, 0xf7, 0x35, 0x01, 0xd0, 0xb6, 0xac, 0xe7, 0x9b, 0x75, 0xbd, 0x2e, 0x35, 0x8c, 0xa9, 0x51, + 0xd7, 0xff, 0x68, 0xc3, 0x91, 0x91, 0xda, 0x17, 0xd8, 0x4d, 0x4f, 0x60, 0x8b, 0xe2, 0x29, 0x07, + 0x30, 0xbd, 0x4e, 0x11, 0xb4, 0x9e, 0x63, 0x54, 0xff, 0x50, 0x80, 0xb9, 0x75, 0x8b, 0x13, 0xae, + 0x64, 0xd1, 0x7e, 0x21, 0x87, 0xd7, 0x83, 0xc2, 0x76, 0x8e, 0x48, 0x18, 0x38, 0x0a, 0xc3, 0x2d, + 0xf2, 0xcb, 0x5a, 0xe3, 0x25, 0xb4, 0x98, 0x26, 0x65, 0x75, 0x59, 0x4b, 0x1b, 0x69, 0xb9, 0xb5, + 0x74, 0xc5, 0xec, 0x8e, 0x7e, 0x5f, 0x80, 0x45, 0x7a, 0x54, 0xf4, 0x45, 0x7b, 0xaf, 0x57, 0x54, + 0x74, 0xdc, 0x23, 0x50, 0x75, 0x97, 0xf9, 0x5e, 0x94, 0x2a, 0x8b, 0xff, 0x67, 0xc5, 0x2e, 0x64, + 0xe1, 0x45, 0xf8, 0x03, 0x01, 0x16, 0xa9, 0x52, 0x1f, 0x3f, 0x65, 0x74, 0xdc, 0x23, 0x50, 0xf6, + 0x96, 0x0f, 0x65, 0x97, 0x92, 0x67, 0x3b, 0x53, 0x46, 0x24, 0x0e, 0x93, 0xf7, 0x89, 0x00, 0x8b, + 0xf4, 0x14, 0xe5, 0x4b, 0xde, 0x9d, 0x5e, 0xe1, 0x75, 0xd8, 0x33, 0xee, 0x1d, 0x1c, 0x26, 0xc6, + 0x61, 0x94, 0x01, 0xe7, 0xce, 0x5b, 0xe7, 0x53, 0x41, 0x90, 0x63, 0x85, 0x9d, 0xe2, 0x54, 0xc3, + 0xca, 0xb6, 0xec, 0xa7, 0x13, 0x37, 0x82, 0x12, 0x61, 0x0e, 0x45, 0x5c, 0x76, 0x0f, 0x65, 0x38, + 0x85, 0x66, 0xbd, 0x10, 0x4a, 0x35, 0x19, 0xfd, 0x86, 0x00, 0xb3, 0x76, 0x2d, 0xb0, 0x80, 0xdd, + 0x0e, 0x0d, 0x80, 0xc9, 0x7d, 0x0f, 0xc8, 0x6f, 0xfa, 0x88, 0xc5, 0xbc, 0xe8, 0x07, 0x1d, 0x8b, + 0xc2, 0x6f, 0x0a, 0x30, 0x6b, 0x97, 0xf4, 0xa3, 0xa0, 0x67, 0xb2, 0xdd, 0x03, 0xfa, 0x37, 0x7c, + 0xd0, 0x9f, 0x49, 0xce, 0xfb, 0xa0, 0x37, 0xa5, 0xf9, 0x9b, 0x02, 0xcc, 0xda, 0xa5, 0xd9, 0x22, + 0xe1, 0xd5, 0xd0, 0x48, 0x3a, 0xc8, 0xef, 0x6d, 0x3f, 0xf9, 0x5d, 0x4c, 0x75, 0x04, 0x89, 0x11, + 0x26, 0x38, 0xc1, 0xb5, 0xa7, 0x5b, 0xf6, 0x13, 0xde, 0xd7, 0x82, 0x42, 0xb7, 0x0d, 0x47, 0xc4, + 0xc0, 0x43, 0x80, 0x17, 0xd0, 0x9c, 0x17, 0xc4, 0x06, 0xed, 0x8b, 0x7e, 0x47, 0x80, 0x39, 0xbb, + 0x10, 0xdb, 0x41, 0xde, 0xed, 0x09, 0x0c, 0x13, 0xe6, 0x1e, 0x29, 0x79, 0xdd, 0x47, 0x24, 0x96, + 0xc4, 0x4e, 0xa4, 0x60, 0x89, 0xf8, 0x0f, 0x02, 0xcc, 0xd9, 0x85, 0xfa, 0x38, 0xa8, 0x61, 0xc2, + 0xdd, 0x23, 0x35, 0x6f, 0xfa, 0x50, 0x73, 0x3e, 0xb9, 0xd4, 0x81, 0x1a, 0x53, 0xc8, 0xbf, 0x2d, + 0xc0, 0x9c, 0x5d, 0xc8, 0xed, 0x24, 0xdd, 0xee, 0x09, 0x55, 0x07, 0x61, 0xbf, 0xeb, 0x27, 0xec, + 0x62, 0xaa, 0x2b, 0x60, 0xf4, 0x45, 0x80, 0x75, 0x59, 0x2f, 0xaa, 0x35, 0x72, 0xa5, 0x71, 0x3e, + 0x40, 0x3a, 0xd2, 0x7c, 0x36, 0x79, 0x36, 0x40, 0x33, 0x71, 0xc9, 0x23, 0xce, 0x33, 0x82, 0xc0, + 0x8a, 0xf3, 0xa0, 0xaf, 0xd3, 0x5d, 0x82, 0x4c, 0x4e, 0xbf, 0xdd, 0x60, 0xd7, 0x19, 0x41, 0xd2, + 0xc3, 0xd2, 0x0e, 0xc1, 0xa0, 0xac, 0x78, 0x40, 0x59, 0x44, 0xf3, 0xc6, 0x55, 0x06, 0x41, 0x44, + 0xbf, 0x26, 0x49, 0x7f, 0x48, 0xff, 0xfd, 0x08, 0xfd, 0x82, 0x00, 0xa3, 0x56, 0xf8, 0xbb, 0xa8, + 0xd6, 0x8e, 0x95, 0x39, 0xd7, 0xa9, 0xaf, 0x8e, 0x11, 0x59, 0x02, 0x36, 0x97, 0x9c, 0xe1, 0xa2, + 0x60, 0x8e, 0xc8, 0x37, 0xc6, 0x53, 0xfa, 0xa1, 0xe2, 0x51, 0x9d, 0x78, 0x26, 0xe8, 0xe2, 0xf1, + 0xdf, 0xac, 0xfa, 0x99, 0xc8, 0xe5, 0xe0, 0x09, 0x7f, 0xc9, 0x97, 0x8a, 0x18, 0xcf, 0x04, 0x8c, + 0x63, 0x3c, 0x7b, 0xa4, 0xd8, 0x7e, 0x20, 0x24, 0xa8, 0x68, 0x85, 0x96, 0xa6, 0x9f, 0x98, 0xfe, + 0x92, 0x00, 0x23, 0x7c, 0x5e, 0xe7, 0xee, 0x1b, 0x8a, 0x47, 0x16, 0xe8, 0x8e, 0x1b, 0x0a, 0x82, + 0x38, 0x87, 0x87, 0x63, 0x93, 0x68, 0xb0, 0x89, 0x7e, 0xb9, 0xf1, 0x91, 0x81, 0x0c, 0xb3, 0xe9, + 0xef, 0x99, 0x21, 0x08, 0x0b, 0xd9, 0xad, 0x60, 0x51, 0xc9, 0xc0, 0xe0, 0x32, 0x1d, 0xc0, 0x61, + 0xa3, 0xe5, 0x09, 0x2e, 0xfd, 0x21, 0xfb, 0x2a, 0x83, 0x18, 0xad, 0x6f, 0x09, 0x30, 0xee, 0x48, + 0x2c, 0xdd, 0x1d, 0xa6, 0x77, 0x26, 0x6a, 0x5f, 0x98, 0xf7, 0x0f, 0x0e, 0x13, 0x93, 0x30, 0xc1, + 0xc1, 0x74, 0xd8, 0xaa, 0x2e, 0x38, 0xd1, 0xf7, 0x04, 0x88, 0xd3, 0xab, 0x3f, 0x73, 0x4e, 0xad, + 0x3b, 0x4a, 0xef, 0xa4, 0xd1, 0xc9, 0xdb, 0xa1, 0xfb, 0xb1, 0xbb, 0xbc, 0x7b, 0xfe, 0xa2, 0x89, + 0x4f, 0x2c, 0xde, 0x44, 0x70, 0x77, 0x90, 0x1f, 0x0b, 0x30, 0x46, 0x87, 0x34, 0x53, 0x1b, 0xdf, + 0x0c, 0x95, 0x6a, 0xd5, 0xa0, 0xe0, 0xb5, 0x90, 0xbd, 0x18, 0xfe, 0x65, 0x9f, 0x50, 0xf7, 0x8c, + 0x38, 0x61, 0x85, 0xba, 0x39, 0xbc, 0xbf, 0x68, 0x25, 0xae, 0x24, 0x7b, 0xc4, 0xe5, 0x80, 0xd3, + 0xe6, 0xb3, 0xc9, 0xa0, 0xc9, 0x72, 0x49, 0xc4, 0x0c, 0xd9, 0x31, 0xa1, 0x48, 0x9e, 0xe2, 0x8a, + 0xa3, 0x31, 0x7b, 0x08, 0x1e, 0xfd, 0x0d, 0x01, 0x46, 0x99, 0x0b, 0xc4, 0x52, 0x39, 0x07, 0x65, + 0xa0, 0x2d, 0x8b, 0x75, 0x70, 0x78, 0x17, 0xd9, 0x0e, 0xcb, 0xe0, 0x59, 0xda, 0x35, 0x26, 0x0e, + 0x99, 0xd8, 0x30, 0xaf, 0xfe, 0xb6, 0x00, 0xa3, 0xcc, 0x9d, 0x09, 0x89, 0xcc, 0x96, 0x27, 0x3b, + 0x38, 0xb2, 0xeb, 0x44, 0xa7, 0xec, 0xc8, 0x4c, 0xce, 0x4d, 0x26, 0x1d, 0x9c, 0xc3, 0x10, 0xff, + 0xbe, 0x00, 0x13, 0xd6, 0xbe, 0x66, 0xc0, 0x3c, 0x89, 0x45, 0xfd, 0x5c, 0x27, 0x6c, 0xa7, 0x93, + 0x49, 0xc7, 0xc5, 0x8a, 0x63, 0xbf, 0xc3, 0x38, 0x4b, 0x2f, 0x25, 0x4e, 0xfb, 0x3e, 0xf8, 0x2d, + 0x01, 0x92, 0xeb, 0xb2, 0xce, 0xd2, 0x60, 0xf0, 0x6f, 0xb6, 0x88, 0xb6, 0x74, 0xdd, 0xf8, 0xec, + 0xf9, 0x33, 0x92, 0xa1, 0xf2, 0x55, 0x88, 0x17, 0x7c, 0x74, 0x79, 0x0c, 0x8d, 0xa4, 0xc9, 0x67, + 0x42, 0xd6, 0xc3, 0x91, 0x69, 0x7c, 0xac, 0x71, 0xa7, 0x4c, 0xf6, 0xdb, 0xb0, 0x57, 0xc2, 0xa5, + 0xbf, 0x24, 0x9b, 0x36, 0x3e, 0x06, 0x4c, 0xc3, 0xa4, 0x81, 0xc6, 0x69, 0x1d, 0xc9, 0xc9, 0xdc, + 0x60, 0xa5, 0x7d, 0xf3, 0xfe, 0x43, 0x01, 0xa6, 0x6c, 0x36, 0xd1, 0xb0, 0xee, 0x77, 0x7a, 0x48, + 0x32, 0x69, 0x28, 0xd1, 0xdd, 0x9e, 0xfa, 0x32, 0x2b, 0xf9, 0xe8, 0xe0, 0x30, 0xb1, 0xe4, 0x49, + 0x0b, 0x32, 0xff, 0xdf, 0x7f, 0x4a, 0xd6, 0x15, 0xf1, 0x02, 0x27, 0x21, 0xd6, 0x87, 0x66, 0x9e, + 0xc6, 0xff, 0x1b, 0x02, 0xc4, 0x33, 0xd5, 0xaa, 0x3d, 0x1d, 0xf5, 0xf5, 0x50, 0x40, 0x33, 0xd5, + 0x6a, 0xc7, 0x2d, 0x36, 0x09, 0x53, 0x0e, 0xd4, 0x76, 0x89, 0xc6, 0xee, 0x8a, 0x5d, 0xa2, 0x39, + 0x77, 0xe5, 0x63, 0x01, 0x26, 0xa9, 0xf7, 0x61, 0x87, 0xf8, 0x6a, 0x28, 0x88, 0x74, 0x04, 0x5f, + 0x94, 0xf9, 0x00, 0x28, 0xc9, 0x61, 0xcb, 0x0b, 0xa5, 0xdd, 0x6f, 0xf9, 0xb6, 0x00, 0x93, 0xd4, + 0x0d, 0x39, 0x0a, 0x5e, 0x3a, 0x82, 0x2f, 0xde, 0xf5, 0x83, 0xc3, 0xc4, 0x1c, 0x4c, 0x3b, 0xf0, + 0x52, 0xe7, 0xc5, 0x04, 0x4c, 0x0e, 0x5b, 0x9d, 0x01, 0xa3, 0x3f, 0x20, 0x71, 0x6c, 0x4e, 0xcc, + 0xa9, 0x0e, 0xbe, 0x1e, 0x3a, 0x19, 0xaf, 0x21, 0xe2, 0x6f, 0xf4, 0xd0, 0x93, 0x09, 0xf8, 0xe7, + 0x0f, 0x0e, 0x13, 0x8b, 0x30, 0x61, 0x9a, 0x0e, 0xa5, 0x21, 0x7b, 0x8a, 0xf7, 0x65, 0xf1, 0x9c, + 0x8f, 0x78, 0x13, 0xd5, 0xe5, 0x85, 0xfb, 0x97, 0x05, 0x18, 0xb3, 0x84, 0x9b, 0x64, 0xb9, 0x5e, + 0x0e, 0x01, 0xb0, 0x93, 0x60, 0xe3, 0x33, 0x6e, 0x02, 0x90, 0x0d, 0xad, 0x5d, 0x60, 0x4e, 0x89, + 0x53, 0x0e, 0xfe, 0x13, 0x7c, 0x6c, 0x57, 0x9e, 0xb0, 0x09, 0x09, 0x81, 0x76, 0x23, 0x4c, 0x6e, + 0xe8, 0xce, 0x02, 0xf2, 0xd6, 0xc1, 0x61, 0xe2, 0x94, 0x65, 0x2c, 0x08, 0x3a, 0x87, 0x78, 0x2c, + 0xa4, 0xe6, 0xbc, 0xe0, 0xa5, 0x3f, 0x6c, 0x4a, 0x7b, 0xf2, 0x47, 0xe8, 0x07, 0xa6, 0x64, 0x70, + 0x4f, 0x45, 0x02, 0x48, 0x86, 0x5f, 0x9e, 0xb7, 0xee, 0x92, 0xe1, 0x9b, 0xd5, 0x4e, 0x7c, 0x7c, + 0x70, 0x98, 0x58, 0x70, 0xbf, 0x20, 0x71, 0x0a, 0xc6, 0x75, 0xf1, 0x8a, 0x8f, 0x60, 0xd8, 0x9e, + 0x98, 0x70, 0xf2, 0xf1, 0x9b, 0x02, 0x8c, 0x73, 0xd3, 0x92, 0xfd, 0xf1, 0x5a, 0x08, 0x9c, 0x41, + 0xee, 0x13, 0xb9, 0xe6, 0x44, 0xc4, 0x03, 0x10, 0x92, 0x42, 0x97, 0x82, 0x10, 0x42, 0x36, 0xd2, + 0xdf, 0x13, 0x60, 0x9a, 0x3a, 0x91, 0x8e, 0xb7, 0xf5, 0xe8, 0xb5, 0x90, 0xd9, 0x13, 0x59, 0xc4, + 0x2d, 0x14, 0x41, 0x3b, 0x76, 0x9d, 0xc5, 0x04, 0x51, 0x25, 0x70, 0x50, 0x74, 0x55, 0xbc, 0xe8, + 0x43, 0x91, 0x52, 0xaf, 0x56, 0x78, 0xaa, 0xf0, 0xb2, 0xfc, 0xb6, 0x79, 0x95, 0xca, 0xd3, 0x73, + 0x23, 0x04, 0x30, 0x16, 0x6f, 0x0b, 0x45, 0xcb, 0xa3, 0x80, 0xb4, 0x5c, 0x4b, 0x06, 0x5e, 0x1d, + 0x4c, 0xcc, 0x7f, 0x16, 0x60, 0xda, 0x72, 0x6f, 0x79, 0x82, 0x4e, 0x52, 0xd2, 0xa4, 0x80, 0xc4, + 0xbc, 0x91, 0xbc, 0x19, 0x94, 0x18, 0xa7, 0x3f, 0x8c, 0x09, 0x2b, 0xfd, 0xd9, 0x20, 0xcc, 0xee, + 0x40, 0xff, 0x4f, 0x33, 0x04, 0xcc, 0x4d, 0xcc, 0xa5, 0x80, 0xbe, 0x1e, 0x3c, 0x7b, 0x35, 0x93, + 0xc3, 0x10, 0xf9, 0xae, 0xc5, 0x46, 0x40, 0x02, 0xb3, 0xc9, 0xfb, 0x81, 0x08, 0xb4, 0x27, 0x94, + 0xa5, 0x0a, 0x47, 0xd3, 0x67, 0x63, 0x5a, 0xff, 0x97, 0x00, 0xc9, 0x92, 0x5c, 0x93, 0x9b, 0xb2, + 0xca, 0x4c, 0x88, 0x2d, 0x25, 0x69, 0xc8, 0x95, 0xec, 0x7a, 0x56, 0xe0, 0x07, 0x17, 0xf5, 0x80, + 0x94, 0x6e, 0x24, 0xd7, 0x03, 0x2f, 0xa5, 0x45, 0x5d, 0xba, 0x4c, 0x1f, 0xc6, 0xd1, 0xec, 0xa9, + 0x34, 0xa3, 0x2a, 0xa6, 0xf8, 0xbf, 0x0a, 0x30, 0x69, 0x73, 0x79, 0xc8, 0xc1, 0x45, 0x43, 0x6f, + 0x84, 0xca, 0x19, 0x69, 0xdb, 0xda, 0xee, 0xf4, 0xd2, 0x95, 0xed, 0x6d, 0xdb, 0x07, 0x87, 0x89, + 0xd3, 0x96, 0x1f, 0x41, 0xce, 0x48, 0xde, 0x9b, 0x82, 0x78, 0xde, 0x87, 0x0b, 0xec, 0x5c, 0xc5, + 0xed, 0x6b, 0x9f, 0x08, 0xe6, 0x77, 0x85, 0x21, 0x0e, 0x7e, 0xf6, 0xcc, 0x8b, 0x21, 0x0f, 0x7e, + 0xab, 0x07, 0x87, 0x89, 0x29, 0x2f, 0x3a, 0x08, 0xf8, 0x73, 0x48, 0xec, 0x0c, 0x9e, 0xec, 0x65, + 0xbf, 0x26, 0x00, 0xb2, 0x85, 0x51, 0xe8, 0x57, 0xf2, 0xa1, 0xf2, 0xa5, 0xb1, 0x5d, 0x2c, 0x1c, + 0xf8, 0x8c, 0xfd, 0x9c, 0x48, 0xc1, 0x5b, 0x41, 0x15, 0x51, 0x5c, 0xe8, 0x88, 0x1e, 0xb3, 0xfc, + 0xbb, 0x02, 0x20, 0x5b, 0xa0, 0xa5, 0x07, 0xec, 0xcc, 0x5a, 0x84, 0xc3, 0xfe, 0xa0, 0x33, 0xf6, + 0x8b, 0xc9, 0x00, 0x9c, 0x67, 0x9b, 0xee, 0x8c, 0x2b, 0x0c, 0x43, 0x89, 0x38, 0x59, 0xc9, 0x29, + 0x75, 0x26, 0xe0, 0xd5, 0xe4, 0x72, 0x77, 0x02, 0x9c, 0x7b, 0x13, 0x26, 0xa6, 0xf4, 0xa3, 0x4b, + 0x8c, 0x7d, 0x3f, 0xfa, 0x84, 0x06, 0x74, 0xfc, 0xb2, 0x72, 0xfa, 0x05, 0x4c, 0x6e, 0xf7, 0x90, + 0x66, 0x90, 0x44, 0x4d, 0x72, 0xe4, 0x74, 0x79, 0xca, 0x4e, 0x83, 0x33, 0x76, 0x42, 0x9e, 0xf8, + 0x18, 0x94, 0x30, 0xf0, 0xf6, 0x10, 0xca, 0x41, 0x04, 0x4e, 0xb9, 0x0d, 0xad, 0x11, 0x47, 0xb9, + 0xdf, 0x6b, 0xd2, 0x3e, 0xc3, 0xe8, 0xbe, 0xd5, 0xfb, 0x00, 0xcc, 0xf4, 0x3e, 0x09, 0x42, 0xe7, + 0x9b, 0xe2, 0xeb, 0x5d, 0x56, 0xcc, 0xc8, 0x7e, 0xe3, 0x19, 0x5e, 0xf9, 0x9e, 0x00, 0xd3, 0xd6, + 0x09, 0x94, 0xcf, 0x8f, 0xfa, 0x5a, 0x78, 0xfc, 0x9d, 0xce, 0xa3, 0x3f, 0x75, 0x70, 0x98, 0x98, + 0x87, 0xa4, 0x27, 0x31, 0x96, 0xfc, 0xbd, 0x26, 0x5e, 0x0f, 0x4b, 0x0d, 0xa6, 0xe2, 0xfb, 0x02, + 0x24, 0x6c, 0x41, 0x18, 0x9e, 0x90, 0xd7, 0xc3, 0x13, 0xd2, 0x25, 0x1c, 0x23, 0x07, 0xa2, 0xe5, + 0x7e, 0xf2, 0x4e, 0xe8, 0x95, 0xb1, 0x85, 0x6a, 0x7e, 0x4f, 0x80, 0x84, 0xed, 0x14, 0x7e, 0x44, + 0xaa, 0xba, 0x9c, 0xc9, 0x2b, 0xe4, 0xf0, 0x37, 0xe7, 0x49, 0x15, 0x77, 0xef, 0xf4, 0xb9, 0xd4, + 0x11, 0xc8, 0x42, 0xbf, 0x6e, 0xde, 0x48, 0x99, 0x9f, 0x93, 0x06, 0xb8, 0x91, 0xf2, 0x4e, 0xf1, + 0xd4, 0xdd, 0x82, 0xf8, 0x64, 0x3f, 0x13, 0x5f, 0xa3, 0x37, 0x52, 0xe4, 0xf9, 0xa2, 0xc3, 0x13, + 0x48, 0x8a, 0xd3, 0xec, 0x0d, 0xa3, 0xdb, 0x6d, 0xf9, 0x16, 0x4b, 0xd0, 0x62, 0xf9, 0x2c, 0x57, + 0x02, 0x23, 0x08, 0xfa, 0x62, 0x9b, 0x9a, 0xe9, 0x37, 0xfc, 0x01, 0x2e, 0x22, 0xf3, 0xf5, 0xa7, + 0xc1, 0x55, 0x9b, 0x93, 0xf2, 0x2b, 0x02, 0x8c, 0x5b, 0x1f, 0xb9, 0xd1, 0x3d, 0x25, 0x1d, 0x78, + 0x66, 0xe6, 0x9e, 0x84, 0x80, 0xca, 0x3e, 0x9f, 0xe1, 0xa0, 0xda, 0xdf, 0x67, 0x79, 0x63, 0xc5, + 0xec, 0xfc, 0x27, 0x02, 0x8c, 0x5b, 0xcf, 0x8b, 0xc3, 0x22, 0x65, 0xce, 0x48, 0x08, 0xa4, 0x6f, + 0x76, 0x40, 0x7a, 0x26, 0xd9, 0x91, 0xab, 0x18, 0xee, 0x77, 0x04, 0x98, 0xb4, 0x7f, 0xde, 0x47, + 0x21, 0x9f, 0x94, 0x0c, 0xe4, 0x3b, 0xc0, 0xc5, 0x67, 0xfc, 0x0e, 0x70, 0x9d, 0xee, 0xc6, 0x77, + 0x48, 0xd0, 0xf7, 0x47, 0x04, 0xba, 0xdd, 0xb9, 0xf8, 0x23, 0x01, 0x66, 0x6d, 0xbb, 0x34, 0x67, + 0x37, 0x82, 0xe6, 0xf3, 0x3d, 0x6e, 0xf3, 0xf1, 0xde, 0xc1, 0x61, 0xe2, 0x1c, 0xcc, 0x1a, 0x96, + 0xd2, 0xa1, 0xa5, 0xc1, 0xc3, 0x7e, 0x7e, 0x76, 0xe6, 0xbf, 0x58, 0xc9, 0x51, 0xec, 0xe6, 0x66, + 0x25, 0x2c, 0xc1, 0xe1, 0x96, 0xed, 0x49, 0x28, 0xba, 0x6e, 0xa2, 0x95, 0x8e, 0x74, 0x79, 0x9b, + 0xa7, 0xdf, 0x17, 0x60, 0xc6, 0x76, 0x86, 0x7a, 0x31, 0x56, 0x4a, 0x3a, 0x38, 0x4c, 0x9c, 0x87, + 0x84, 0x07, 0x69, 0x9e, 0x47, 0xfa, 0x15, 0xf1, 0x5a, 0x28, 0xda, 0xf0, 0xaa, 0xfd, 0x37, 0x01, + 0x66, 0x6c, 0x27, 0x2c, 0x8b, 0xb2, 0x5b, 0x61, 0xd7, 0x2d, 0xbc, 0x71, 0x7b, 0x1a, 0x8e, 0xc0, + 0xdb, 0xc9, 0x1e, 0x16, 0xcf, 0x08, 0xc8, 0xb8, 0x8e, 0x61, 0x16, 0xa5, 0x27, 0x2c, 0xa1, 0x6a, + 0x38, 0x2a, 0xd7, 0x92, 0xf7, 0xc2, 0x53, 0xe9, 0x34, 0x9e, 0x34, 0x04, 0xf5, 0x67, 0x9b, 0x62, + 0xbb, 0xcd, 0xfd, 0x4a, 0x04, 0xe6, 0xdd, 0x27, 0x23, 0xce, 0xf0, 0xae, 0x86, 0x8a, 0x1a, 0x1c, + 0xb3, 0xf5, 0xd5, 0x0f, 0x0e, 0x13, 0x69, 0x58, 0xb0, 0xfb, 0xa9, 0x4e, 0x5b, 0x65, 0xff, 0x6f, + 0x3a, 0x28, 0x6f, 0xee, 0x8a, 0xb7, 0x0c, 0xde, 0x18, 0xc4, 0x3b, 0x33, 0x84, 0xfa, 0xdb, 0xe4, + 0x3f, 0x16, 0xec, 0xff, 0xc3, 0x85, 0xdd, 0x30, 0xdf, 0xee, 0x89, 0x21, 0xe1, 0x24, 0xe1, 0x83, + 0x5e, 0xe9, 0xbe, 0x8f, 0xde, 0x0c, 0x4a, 0xb7, 0xb7, 0xcd, 0xfe, 0x13, 0xeb, 0x05, 0xb5, 0x17, + 0x19, 0xe8, 0x6e, 0x4f, 0xd4, 0x87, 0x37, 0xe2, 0xcf, 0x0f, 0x0e, 0x13, 0xd7, 0x61, 0xd1, 0x97, + 0x03, 0x54, 0x23, 0xbc, 0x58, 0xc0, 0x9d, 0x92, 0xc3, 0xb2, 0x00, 0x2f, 0xfe, 0x97, 0x23, 0xe6, + 0xa3, 0xeb, 0x63, 0x64, 0x40, 0x78, 0x23, 0xff, 0x17, 0x7a, 0x66, 0xc0, 0x6a, 0xf2, 0x68, 0x32, + 0x80, 0xb9, 0xf0, 0xd7, 0x22, 0x70, 0xda, 0x3b, 0x02, 0x67, 0x71, 0xe2, 0x45, 0x28, 0xc2, 0xcf, + 0x09, 0x3d, 0xb3, 0xa1, 0x90, 0xcc, 0x1f, 0x89, 0x0d, 0xce, 0xbd, 0x01, 0xb3, 0xa4, 0xf4, 0xe3, + 0xce, 0x12, 0xd7, 0xf3, 0xae, 0x71, 0x76, 0x31, 0x6f, 0xe6, 0x91, 0xbd, 0x15, 0x32, 0x5b, 0x6f, + 0xe0, 0x3d, 0xc2, 0x27, 0xb3, 0xae, 0xb8, 0x48, 0xbf, 0x2f, 0x15, 0x27, 0xd3, 0x52, 0x5b, 0xdf, + 0x75, 0x59, 0xf3, 0xd5, 0xdf, 0x12, 0xbe, 0x9a, 0xf9, 0x25, 0x01, 0xad, 0xc3, 0x98, 0x95, 0x9a, + 0x69, 0x29, 0xb3, 0x95, 0x17, 0xaf, 0xa3, 0xe5, 0x5d, 0x5d, 0x6f, 0x69, 0x77, 0xd2, 0xe9, 0x5a, + 0x5d, 0xdf, 0x6d, 0x3f, 0x59, 0xae, 0x28, 0x7b, 0x69, 0x8c, 0x22, 0xcd, 0x50, 0xa4, 0x5b, 0xef, + 0xd7, 0xd2, 0x16, 0x92, 0x95, 0xe8, 0xf5, 0xe5, 0x1b, 0x29, 0x21, 0xb2, 0xc2, 0xff, 0x27, 0x81, + 0xe9, 0x9f, 0xd5, 0x94, 0xa6, 0xbd, 0xa4, 0xa6, 0xb6, 0x2a, 0x77, 0x5c, 0x6d, 0xee, 0xb8, 0xda, + 0xfc, 0x64, 0xc0, 0x79, 0xd3, 0x52, 0xab, 0x4e, 0x3a, 0x3c, 0xe9, 0x27, 0x71, 0x9c, 0x57, 0xff, + 0x34, 0x00, 0x00, 0xff, 0xff, 0xbc, 0x20, 0xfd, 0x2d, 0x76, 0xa8, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// ManagementServiceClient is the client API for ManagementService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type ManagementServiceClient interface { + //READINESS + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //USER + GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) + SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) + IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) + CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) + DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + //USER_PROFILE + GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) + UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) + ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) + ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) + UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + //MFA + GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //ORG + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) + DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) + AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) + ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) + UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) + DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) + SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) + AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) + AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) + ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) + UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) + DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) + RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) + UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) + DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //Grant + SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) +} + +type managementServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewManagementServiceClient(cc grpc.ClientConnInterface) ManagementServiceClient { + return &managementServiceClient{cc} +} + +func (c *managementServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) { + out := new(UserSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { + out := new(UniqueUserResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/LockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) { + out := new(OrgMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) { + out := new(OrgMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) { + out := new(ProjectSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) { + out := new(ProjectMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) { + out := new(ProjectMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) { + out := new(ProjectRoleSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { + out := new(ApplicationSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) { + out := new(OIDCConfig) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) { + out := new(ClientSecret) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) { + out := new(ProjectGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) { + out := new(ProjectGrantMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) { + out := new(ProjectGrantMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) { + out := new(AuthGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// ManagementServiceServer is the server API for ManagementService service. +type ManagementServiceServer interface { + //READINESS + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //USER + GetUserByID(context.Context, *UserID) (*User, error) + GetUserByEmailGlobal(context.Context, *UserEmailID) (*User, error) + SearchUsers(context.Context, *UserSearchRequest) (*UserSearchResponse, error) + IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) + CreateUser(context.Context, *CreateUserRequest) (*User, error) + DeactivateUser(context.Context, *UserID) (*User, error) + ReactivateUser(context.Context, *UserID) (*User, error) + LockUser(context.Context, *UserID) (*User, error) + UnlockUser(context.Context, *UserID) (*User, error) + DeleteUser(context.Context, *UserID) (*empty.Empty, error) + UserChanges(context.Context, *ChangeRequest) (*Changes, error) + ApplicationChanges(context.Context, *ChangeRequest) (*Changes, error) + OrgChanges(context.Context, *ChangeRequest) (*Changes, error) + ProjectChanges(context.Context, *ChangeRequest) (*Changes, error) + //USER_PROFILE + GetUserProfile(context.Context, *UserID) (*UserProfile, error) + UpdateUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(context.Context, *UserID) (*UserEmail, error) + ChangeUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(context.Context, *UserID) (*UserPhone, error) + ChangeUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + ResendPhoneVerificationCode(context.Context, *UserID) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(context.Context, *UserID) (*UserAddress, error) + UpdateUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + //MFA + GetUserMfas(context.Context, *UserID) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(context.Context, *SetPasswordNotificationRequest) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(context.Context, *empty.Empty) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyID) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(context.Context, *empty.Empty) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(context.Context, *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(context.Context, *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(context.Context, *PasswordAgePolicyID) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(context.Context, *empty.Empty) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyID) (*empty.Empty, error) + //ORG + GetOrgByID(context.Context, *OrgID) (*Org, error) + GetOrgByDomainGlobal(context.Context, *OrgDomain) (*Org, error) + DeactivateOrg(context.Context, *OrgID) (*Org, error) + ReactivateOrg(context.Context, *OrgID) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(context.Context, *empty.Empty) (*OrgMemberRoles, error) + AddOrgMember(context.Context, *AddOrgMemberRequest) (*empty.Empty, error) + ChangeOrgMember(context.Context, *ChangeOrgMemberRequest) (*empty.Empty, error) + RemoveOrgMember(context.Context, *RemoveOrgMemberRequest) (*empty.Empty, error) + SearchOrgMembers(context.Context, *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(context.Context, *ProjectSearchRequest) (*ProjectSearchResponse, error) + ProjectByID(context.Context, *ProjectID) (*Project, error) + CreateProject(context.Context, *ProjectCreateRequest) (*Project, error) + UpdateProject(context.Context, *ProjectUpdateRequest) (*Project, error) + DeactivateProject(context.Context, *ProjectID) (*Project, error) + ReactivateProject(context.Context, *ProjectID) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(context.Context, *GrantedGrantID) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(context.Context, *empty.Empty) (*ProjectMemberRoles, error) + SearchProjectMembers(context.Context, *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) + AddProjectMember(context.Context, *ProjectMemberAdd) (*empty.Empty, error) + ChangeProjectMember(context.Context, *ProjectMemberChange) (*empty.Empty, error) + RemoveProjectMember(context.Context, *ProjectMemberRemove) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(context.Context, *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) + AddProjectRole(context.Context, *ProjectRoleAdd) (*empty.Empty, error) + RemoveProjectRole(context.Context, *ProjectRoleRemove) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) + ApplicationByID(context.Context, *ApplicationID) (*Application, error) + CreateOIDCApplication(context.Context, *OIDCApplicationCreate) (*Application, error) + UpdateApplication(context.Context, *ApplicationUpdate) (*Application, error) + DeactivateApplication(context.Context, *ApplicationID) (*Application, error) + ReactivateApplication(context.Context, *ApplicationID) (*Application, error) + UpdateApplicationOIDCConfig(context.Context, *OIDCConfigUpdate) (*OIDCConfig, error) + RegenerateOIDCClientSecret(context.Context, *ApplicationID) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(context.Context, *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(context.Context, *ProjectGrantID) (*ProjectGrant, error) + CreateProjectGrant(context.Context, *ProjectGrantCreate) (*ProjectGrant, error) + UpdateProjectGrant(context.Context, *ProjectGrantUpdate) (*ProjectGrant, error) + DeactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + ReactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(context.Context, *empty.Empty) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(context.Context, *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(context.Context, *ProjectGrantMemberAdd) (*empty.Empty, error) + ChangeProjectGrantMember(context.Context, *ProjectGrantMemberChange) (*empty.Empty, error) + RemoveProjectGrantMember(context.Context, *ProjectGrantMemberRemove) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(context.Context, *UserGrantSearchRequest) (*UserGrantSearchResponse, error) + UserGrantByID(context.Context, *UserGrantID) (*UserGrant, error) + CreateUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateUserGrant(context.Context, *UserGrantUpdate) (*UserGrant, error) + DeactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + ReactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(context.Context, *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(context.Context, *ProjectUserGrantID) (*UserGrant, error) + CreateProjectUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateProjectUserGrant(context.Context, *ProjectUserGrantUpdate) (*UserGrant, error) + DeactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + ReactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(context.Context, *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + CreateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantCreate) (*UserGrant, error) + UpdateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantUpdate) (*UserGrant, error) + DeactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + ReactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + //Grant + SearchAuthGrant(context.Context, *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) +} + +// UnimplementedManagementServiceServer can be embedded to have forward compatible implementations. +type UnimplementedManagementServiceServer struct { +} + +func (*UnimplementedManagementServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedManagementServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedManagementServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByEmailGlobal(ctx context.Context, req *UserEmailID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByEmailGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUsers(ctx context.Context, req *UserSearchRequest) (*UserSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUsers not implemented") +} +func (*UnimplementedManagementServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUser(ctx context.Context, req *CreateUserRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) LockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method LockUser not implemented") +} +func (*UnimplementedManagementServiceServer) UnlockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method UnlockUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeleteUser(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeleteUser not implemented") +} +func (*UnimplementedManagementServiceServer) UserChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationChanges not implemented") +} +func (*UnimplementedManagementServiceServer) OrgChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method OrgChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectChanges not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserProfile(ctx context.Context, req *UserID) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserEmail(ctx context.Context, req *UserID) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserPhone(ctx context.Context, req *UserID) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ResendPhoneVerificationCode(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendPhoneVerificationCode not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserAddress(ctx context.Context, req *UserID) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserMfas(ctx context.Context, req *UserID) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserMfas not implemented") +} +func (*UnimplementedManagementServiceServer) SendSetPasswordNotification(ctx context.Context, req *SetPasswordNotificationRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SendSetPasswordNotification not implemented") +} +func (*UnimplementedManagementServiceServer) SetInitialPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetInitialPassword not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordComplexityPolicy(ctx context.Context, req *empty.Empty) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordAgePolicy(ctx context.Context, req *empty.Empty) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordLockoutPolicy(ctx context.Context, req *empty.Empty) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByDomainGlobal(ctx context.Context, req *OrgDomain) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByDomainGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgMemberRoles(ctx context.Context, req *empty.Empty) (*OrgMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddOrgMember(ctx context.Context, req *AddOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeOrgMember(ctx context.Context, req *ChangeOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveOrgMember(ctx context.Context, req *RemoveOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchOrgMembers(ctx context.Context, req *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgMembers not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjects(ctx context.Context, req *ProjectSearchRequest) (*ProjectSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjects not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectByID(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProject(ctx context.Context, req *ProjectCreateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProject not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProject(ctx context.Context, req *ProjectUpdateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProject not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) GetGrantedProjectGrantByID(ctx context.Context, req *GrantedGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetGrantedProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectMembers(ctx context.Context, req *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectMember(ctx context.Context, req *ProjectMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectMember(ctx context.Context, req *ProjectMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectMember(ctx context.Context, req *ProjectMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectRoles(ctx context.Context, req *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectRole(ctx context.Context, req *ProjectRoleAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectRole(ctx context.Context, req *ProjectRoleRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateOIDCApplication(ctx context.Context, req *OIDCApplicationCreate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateOIDCApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplication(ctx context.Context, req *ApplicationUpdate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplicationOIDCConfig(ctx context.Context, req *OIDCConfigUpdate) (*OIDCConfig, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplicationOIDCConfig not implemented") +} +func (*UnimplementedManagementServiceServer) RegenerateOIDCClientSecret(ctx context.Context, req *ApplicationID) (*ClientSecret, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegenerateOIDCClientSecret not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrants(ctx context.Context, req *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantByID(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrant(ctx context.Context, req *ProjectGrantCreate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrant(ctx context.Context, req *ProjectGrantUpdate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectGrantMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectGrantMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectGrantMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantMembers(ctx context.Context, req *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectGrantMember(ctx context.Context, req *ProjectGrantMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectGrantMember(ctx context.Context, req *ProjectGrantMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectGrantMember(ctx context.Context, req *ProjectGrantMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUserGrants(ctx context.Context, req *UserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) UserGrantByID(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserGrant(ctx context.Context, req *UserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectUserGrants(ctx context.Context, req *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectUserGrantByID(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectUserGrant(ctx context.Context, req *ProjectUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantUserGrants(ctx context.Context, req *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantUserGrantByID(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchAuthGrant(ctx context.Context, req *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchAuthGrant not implemented") +} + +func RegisterManagementServiceServer(s *grpc.Server, srv ManagementServiceServer) { + s.RegisterService(&_ManagementService_serviceDesc, srv) +} + +func _ManagementService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByID(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByEmailGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserEmailID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, req.(*UserEmailID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUsers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUsers(ctx, req.(*UserSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).IsUserUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUser(ctx, req.(*CreateUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_LockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).LockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/LockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).LockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UnlockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UnlockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UnlockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeleteUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeleteUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeleteUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_OrgChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).OrgChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).OrgChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserProfile(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserEmail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserPhone(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserAddress(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserMfas(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SendSetPasswordNotification_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SetPasswordNotificationRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, req.(*SetPasswordNotificationRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SetInitialPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, req.(*PasswordAgePolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByDomainGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgDomain) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, req.(*OrgDomain)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AddOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddOrgMember(ctx, req.(*AddOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, req.(*ChangeOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RemoveOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, req.(*RemoveOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchOrgMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, req.(*OrgMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjects_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjects(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjects(ctx, req.(*ProjectSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectByID(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectCreateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProject(ctx, req.(*ProjectCreateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUpdateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProject(ctx, req.(*ProjectUpdateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetGrantedProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(GrantedGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, req.(*GrantedGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, req.(*ProjectMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectMember(ctx, req.(*ProjectMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, req.(*ProjectMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, req.(*ProjectMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, req.(*ProjectRoleSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectRole(ctx, req.(*ProjectRoleAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, req.(*ProjectRoleRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchApplications(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationByID(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateOIDCApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCApplicationCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, req.(*OIDCApplicationCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplication(ctx, req.(*ApplicationUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplicationOIDCConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCConfigUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, req.(*OIDCConfigUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RegenerateOIDCClientSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, req.(*ProjectGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, req.(*ProjectGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, req.(*ProjectGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectGrantMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, req.(*ProjectGrantMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, req.(*ProjectGrantMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, req.(*ProjectGrantMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, req.(*ProjectGrantMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, req.(*UserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserGrantByID(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, req.(*UserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, req.(*ProjectUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, req.(*ProjectUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, req.(*ProjectGrantUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchAuthGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, req.(*AuthGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _ManagementService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "caos.zitadel.management.api.v1.ManagementService", + HandlerType: (*ManagementServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _ManagementService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _ManagementService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _ManagementService_Validate_Handler, + }, + { + MethodName: "GetUserByID", + Handler: _ManagementService_GetUserByID_Handler, + }, + { + MethodName: "GetUserByEmailGlobal", + Handler: _ManagementService_GetUserByEmailGlobal_Handler, + }, + { + MethodName: "SearchUsers", + Handler: _ManagementService_SearchUsers_Handler, + }, + { + MethodName: "IsUserUnique", + Handler: _ManagementService_IsUserUnique_Handler, + }, + { + MethodName: "CreateUser", + Handler: _ManagementService_CreateUser_Handler, + }, + { + MethodName: "DeactivateUser", + Handler: _ManagementService_DeactivateUser_Handler, + }, + { + MethodName: "ReactivateUser", + Handler: _ManagementService_ReactivateUser_Handler, + }, + { + MethodName: "LockUser", + Handler: _ManagementService_LockUser_Handler, + }, + { + MethodName: "UnlockUser", + Handler: _ManagementService_UnlockUser_Handler, + }, + { + MethodName: "DeleteUser", + Handler: _ManagementService_DeleteUser_Handler, + }, + { + MethodName: "UserChanges", + Handler: _ManagementService_UserChanges_Handler, + }, + { + MethodName: "ApplicationChanges", + Handler: _ManagementService_ApplicationChanges_Handler, + }, + { + MethodName: "OrgChanges", + Handler: _ManagementService_OrgChanges_Handler, + }, + { + MethodName: "ProjectChanges", + Handler: _ManagementService_ProjectChanges_Handler, + }, + { + MethodName: "GetUserProfile", + Handler: _ManagementService_GetUserProfile_Handler, + }, + { + MethodName: "UpdateUserProfile", + Handler: _ManagementService_UpdateUserProfile_Handler, + }, + { + MethodName: "GetUserEmail", + Handler: _ManagementService_GetUserEmail_Handler, + }, + { + MethodName: "ChangeUserEmail", + Handler: _ManagementService_ChangeUserEmail_Handler, + }, + { + MethodName: "ResendEmailVerificationMail", + Handler: _ManagementService_ResendEmailVerificationMail_Handler, + }, + { + MethodName: "GetUserPhone", + Handler: _ManagementService_GetUserPhone_Handler, + }, + { + MethodName: "ChangeUserPhone", + Handler: _ManagementService_ChangeUserPhone_Handler, + }, + { + MethodName: "ResendPhoneVerificationCode", + Handler: _ManagementService_ResendPhoneVerificationCode_Handler, + }, + { + MethodName: "GetUserAddress", + Handler: _ManagementService_GetUserAddress_Handler, + }, + { + MethodName: "UpdateUserAddress", + Handler: _ManagementService_UpdateUserAddress_Handler, + }, + { + MethodName: "GetUserMfas", + Handler: _ManagementService_GetUserMfas_Handler, + }, + { + MethodName: "SendSetPasswordNotification", + Handler: _ManagementService_SendSetPasswordNotification_Handler, + }, + { + MethodName: "SetInitialPassword", + Handler: _ManagementService_SetInitialPassword_Handler, + }, + { + MethodName: "GetPasswordComplexityPolicy", + Handler: _ManagementService_GetPasswordComplexityPolicy_Handler, + }, + { + MethodName: "CreatePasswordComplexityPolicy", + Handler: _ManagementService_CreatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "UpdatePasswordComplexityPolicy", + Handler: _ManagementService_UpdatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "DeletePasswordComplexityPolicy", + Handler: _ManagementService_DeletePasswordComplexityPolicy_Handler, + }, + { + MethodName: "GetPasswordAgePolicy", + Handler: _ManagementService_GetPasswordAgePolicy_Handler, + }, + { + MethodName: "CreatePasswordAgePolicy", + Handler: _ManagementService_CreatePasswordAgePolicy_Handler, + }, + { + MethodName: "UpdatePasswordAgePolicy", + Handler: _ManagementService_UpdatePasswordAgePolicy_Handler, + }, + { + MethodName: "DeletePasswordAgePolicy", + Handler: _ManagementService_DeletePasswordAgePolicy_Handler, + }, + { + MethodName: "GetPasswordLockoutPolicy", + Handler: _ManagementService_GetPasswordLockoutPolicy_Handler, + }, + { + MethodName: "CreatePasswordLockoutPolicy", + Handler: _ManagementService_CreatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "UpdatePasswordLockoutPolicy", + Handler: _ManagementService_UpdatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "DeletePasswordLockoutPolicy", + Handler: _ManagementService_DeletePasswordLockoutPolicy_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _ManagementService_GetOrgByID_Handler, + }, + { + MethodName: "GetOrgByDomainGlobal", + Handler: _ManagementService_GetOrgByDomainGlobal_Handler, + }, + { + MethodName: "DeactivateOrg", + Handler: _ManagementService_DeactivateOrg_Handler, + }, + { + MethodName: "ReactivateOrg", + Handler: _ManagementService_ReactivateOrg_Handler, + }, + { + MethodName: "GetOrgMemberRoles", + Handler: _ManagementService_GetOrgMemberRoles_Handler, + }, + { + MethodName: "AddOrgMember", + Handler: _ManagementService_AddOrgMember_Handler, + }, + { + MethodName: "ChangeOrgMember", + Handler: _ManagementService_ChangeOrgMember_Handler, + }, + { + MethodName: "RemoveOrgMember", + Handler: _ManagementService_RemoveOrgMember_Handler, + }, + { + MethodName: "SearchOrgMembers", + Handler: _ManagementService_SearchOrgMembers_Handler, + }, + { + MethodName: "SearchProjects", + Handler: _ManagementService_SearchProjects_Handler, + }, + { + MethodName: "ProjectByID", + Handler: _ManagementService_ProjectByID_Handler, + }, + { + MethodName: "CreateProject", + Handler: _ManagementService_CreateProject_Handler, + }, + { + MethodName: "UpdateProject", + Handler: _ManagementService_UpdateProject_Handler, + }, + { + MethodName: "DeactivateProject", + Handler: _ManagementService_DeactivateProject_Handler, + }, + { + MethodName: "ReactivateProject", + Handler: _ManagementService_ReactivateProject_Handler, + }, + { + MethodName: "GetGrantedProjectGrantByID", + Handler: _ManagementService_GetGrantedProjectGrantByID_Handler, + }, + { + MethodName: "GetProjectMemberRoles", + Handler: _ManagementService_GetProjectMemberRoles_Handler, + }, + { + MethodName: "SearchProjectMembers", + Handler: _ManagementService_SearchProjectMembers_Handler, + }, + { + MethodName: "AddProjectMember", + Handler: _ManagementService_AddProjectMember_Handler, + }, + { + MethodName: "ChangeProjectMember", + Handler: _ManagementService_ChangeProjectMember_Handler, + }, + { + MethodName: "RemoveProjectMember", + Handler: _ManagementService_RemoveProjectMember_Handler, + }, + { + MethodName: "SearchProjectRoles", + Handler: _ManagementService_SearchProjectRoles_Handler, + }, + { + MethodName: "AddProjectRole", + Handler: _ManagementService_AddProjectRole_Handler, + }, + { + MethodName: "RemoveProjectRole", + Handler: _ManagementService_RemoveProjectRole_Handler, + }, + { + MethodName: "SearchApplications", + Handler: _ManagementService_SearchApplications_Handler, + }, + { + MethodName: "ApplicationByID", + Handler: _ManagementService_ApplicationByID_Handler, + }, + { + MethodName: "CreateOIDCApplication", + Handler: _ManagementService_CreateOIDCApplication_Handler, + }, + { + MethodName: "UpdateApplication", + Handler: _ManagementService_UpdateApplication_Handler, + }, + { + MethodName: "DeactivateApplication", + Handler: _ManagementService_DeactivateApplication_Handler, + }, + { + MethodName: "ReactivateApplication", + Handler: _ManagementService_ReactivateApplication_Handler, + }, + { + MethodName: "UpdateApplicationOIDCConfig", + Handler: _ManagementService_UpdateApplicationOIDCConfig_Handler, + }, + { + MethodName: "RegenerateOIDCClientSecret", + Handler: _ManagementService_RegenerateOIDCClientSecret_Handler, + }, + { + MethodName: "SearchProjectGrants", + Handler: _ManagementService_SearchProjectGrants_Handler, + }, + { + MethodName: "ProjectGrantByID", + Handler: _ManagementService_ProjectGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrant", + Handler: _ManagementService_CreateProjectGrant_Handler, + }, + { + MethodName: "UpdateProjectGrant", + Handler: _ManagementService_UpdateProjectGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrant", + Handler: _ManagementService_DeactivateProjectGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrant", + Handler: _ManagementService_ReactivateProjectGrant_Handler, + }, + { + MethodName: "GetProjectGrantMemberRoles", + Handler: _ManagementService_GetProjectGrantMemberRoles_Handler, + }, + { + MethodName: "SearchProjectGrantMembers", + Handler: _ManagementService_SearchProjectGrantMembers_Handler, + }, + { + MethodName: "AddProjectGrantMember", + Handler: _ManagementService_AddProjectGrantMember_Handler, + }, + { + MethodName: "ChangeProjectGrantMember", + Handler: _ManagementService_ChangeProjectGrantMember_Handler, + }, + { + MethodName: "RemoveProjectGrantMember", + Handler: _ManagementService_RemoveProjectGrantMember_Handler, + }, + { + MethodName: "SearchUserGrants", + Handler: _ManagementService_SearchUserGrants_Handler, + }, + { + MethodName: "UserGrantByID", + Handler: _ManagementService_UserGrantByID_Handler, + }, + { + MethodName: "CreateUserGrant", + Handler: _ManagementService_CreateUserGrant_Handler, + }, + { + MethodName: "UpdateUserGrant", + Handler: _ManagementService_UpdateUserGrant_Handler, + }, + { + MethodName: "DeactivateUserGrant", + Handler: _ManagementService_DeactivateUserGrant_Handler, + }, + { + MethodName: "ReactivateUserGrant", + Handler: _ManagementService_ReactivateUserGrant_Handler, + }, + { + MethodName: "SearchProjectUserGrants", + Handler: _ManagementService_SearchProjectUserGrants_Handler, + }, + { + MethodName: "ProjectUserGrantByID", + Handler: _ManagementService_ProjectUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectUserGrant", + Handler: _ManagementService_CreateProjectUserGrant_Handler, + }, + { + MethodName: "UpdateProjectUserGrant", + Handler: _ManagementService_UpdateProjectUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectUserGrant", + Handler: _ManagementService_DeactivateProjectUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectUserGrant", + Handler: _ManagementService_ReactivateProjectUserGrant_Handler, + }, + { + MethodName: "SearchProjectGrantUserGrants", + Handler: _ManagementService_SearchProjectGrantUserGrants_Handler, + }, + { + MethodName: "ProjectGrantUserGrantByID", + Handler: _ManagementService_ProjectGrantUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrantUserGrant", + Handler: _ManagementService_CreateProjectGrantUserGrant_Handler, + }, + { + MethodName: "UpdateProjectGrantUserGrant", + Handler: _ManagementService_UpdateProjectGrantUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrantUserGrant", + Handler: _ManagementService_DeactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrantUserGrant", + Handler: _ManagementService_ReactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "SearchAuthGrant", + Handler: _ManagementService_SearchAuthGrant_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "management.proto", +} diff --git a/pkg/management/api/grpc/management.pb.gw.go b/pkg/management/api/grpc/management.pb.gw.go new file mode 100644 index 0000000000..8ac730cbf5 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.gw.go @@ -0,0 +1,6078 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: management.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_ManagementService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByEmailGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserEmailID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["email"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "email") + } + + protoReq.Email, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "email", err) + } + + msg, err := client.GetUserByEmailGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUsers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_ManagementService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueUserRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_IsUserUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_LockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.LockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UnlockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UnlockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeleteUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_UserChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_UserChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_UserChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UserChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ApplicationChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ApplicationChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ApplicationChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ApplicationChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_OrgChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_OrgChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_OrgChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.OrgChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ProjectChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ProjectChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ProjectChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ProjectChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserMfas_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SendSetPasswordNotification_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SetPasswordNotificationRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SendSetPasswordNotification(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SetInitialPassword_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SetInitialPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByDomainGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgDomain + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["domain"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "domain") + } + + protoReq.Domain, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "domain", err) + } + + msg, err := client.GetOrgByDomainGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetOrgMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AddOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.AddOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RemoveOrgMemberRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchOrgMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.SearchOrgMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjects_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchProjects(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectCreateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUpdateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetGrantedProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq GrantedGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetGrantedProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["name"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "name") + } + + protoReq.Name, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "name", err) + } + + msg, err := client.RemoveProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateOIDCApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCApplicationCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateOIDCApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplicationOIDCConfig_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCConfigUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["application_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "application_id") + } + + protoReq.ApplicationId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "application_id", err) + } + + msg, err := client.UpdateApplicationOIDCConfig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RegenerateOIDCClientSecret_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.RegenerateOIDCClientSecret(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectGrantMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectGrantMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.SearchProjectGrantMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.AddProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + msg, err := client.SearchProjectGrantUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchAuthGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchAuthGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterManagementServiceHandlerFromEndpoint is same as RegisterManagementServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterManagementServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterManagementServiceHandler(ctx, mux, conn) +} + +// RegisterManagementServiceHandler registers the http handlers for service ManagementService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterManagementServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterManagementServiceHandlerClient(ctx, mux, NewManagementServiceClient(conn)) +} + +// RegisterManagementServiceHandlerClient registers the http handlers for service ManagementService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "ManagementServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ManagementServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "ManagementServiceClient" to call the correct interceptors. +func RegisterManagementServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client ManagementServiceClient) error { + + mux.Handle("GET", pattern_ManagementService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByEmailGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByEmailGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByEmailGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUsers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUsers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_LockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_LockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_LockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UnlockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UnlockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UnlockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeleteUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeleteUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_OrgChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_OrgChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_OrgChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SendSetPasswordNotification_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SendSetPasswordNotification_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SendSetPasswordNotification_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SetInitialPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SetInitialPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SetInitialPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByDomainGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByDomainGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByDomainGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchOrgMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchOrgMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchOrgMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjects_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjects_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetGrantedProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetGrantedProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetGrantedProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateOIDCApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateOIDCApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateOIDCApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplicationOIDCConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplicationOIDCConfig_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplicationOIDCConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_RegenerateOIDCClientSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RegenerateOIDCClientSecret_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RegenerateOIDCClientSecret_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectGrantMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectGrantMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectGrantMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchAuthGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchAuthGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchAuthGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_ManagementService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_ManagementService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_ManagementService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_ManagementService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_GetUserByEmailGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "users", "email"}, "")) + + pattern_ManagementService_SearchUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_search"}, "")) + + pattern_ManagementService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) + + pattern_ManagementService_CreateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"users"}, "")) + + pattern_ManagementService_DeactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_reactivate"}, "")) + + pattern_ManagementService_LockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_lock"}, "")) + + pattern_ManagementService_UnlockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_unlock"}, "")) + + pattern_ManagementService_DeleteUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_UserChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "changes"}, "")) + + pattern_ManagementService_ApplicationChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"applications", "id", "changes"}, "")) + + pattern_ManagementService_OrgChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "changes"}, "")) + + pattern_ManagementService_ProjectChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "changes"}, "")) + + pattern_ManagementService_GetUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_UpdateUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_GetUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ChangeUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) + + pattern_ManagementService_GetUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ChangeUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ResendPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "phone", "_resendverification"}, "")) + + pattern_ManagementService_GetUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_UpdateUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_GetUserMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "mfas"}, "")) + + pattern_ManagementService_SendSetPasswordNotification_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_sendsetpwnotify"}, "")) + + pattern_ManagementService_SetInitialPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_setinitialpw"}, "")) + + pattern_ManagementService_GetPasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_GetPasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_CreatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_UpdatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_DeletePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_GetPasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_ManagementService_GetOrgByDomainGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "orgs", "domain"}, "")) + + pattern_ManagementService_DeactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetOrgMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"orgs", "members", "roles"}, "")) + + pattern_ManagementService_AddOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "org_id", "members"}, "")) + + pattern_ManagementService_ChangeOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchOrgMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"orgs", "org_id", "members", "_search"}, "")) + + pattern_ManagementService_SearchProjects_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"projects", "_search"}, "")) + + pattern_ManagementService_ProjectByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_CreateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"projects"}, "")) + + pattern_ManagementService_UpdateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_DeactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetGrantedProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"grants", "id"}, "")) + + pattern_ManagementService_GetProjectMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"projects", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "members"}, "")) + + pattern_ManagementService_ChangeProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchProjectRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "roles", "_search"}, "")) + + pattern_ManagementService_AddProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "roles"}, "")) + + pattern_ManagementService_RemoveProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "roles", "name"}, "")) + + pattern_ManagementService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "applications", "_search"}, "")) + + pattern_ManagementService_ApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_CreateOIDCApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "oidcapplications"}, "")) + + pattern_ManagementService_UpdateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_DeactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_reactivate"}, "")) + + pattern_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "application_id", "oidcconfig"}, "")) + + pattern_ManagementService_RegenerateOIDCClientSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "applications", "id", "oidcconfig", "_changeclientsecret"}, "")) + + pattern_ManagementService_SearchProjectGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetProjectGrantMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"projects", "grants", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectGrantMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "grant_id", "members"}, "")) + + pattern_ManagementService_ChangeProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "grants", "_search"}, "")) + + pattern_ManagementService_UserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projects", "project_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectGrantUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchAuthGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"authgrants", "_search"}, "")) +) + +var ( + forward_ManagementService_Healthz_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Ready_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Validate_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByEmailGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUsers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_IsUserUnique_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_LockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UnlockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeleteUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_OrgChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserMfas_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SendSetPasswordNotification_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SetInitialPassword_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByDomainGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchOrgMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjects_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetGrantedProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchApplications_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateOIDCApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RegenerateOIDCClientSecret_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectGrantMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchAuthGrant_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json new file mode 100644 index 0000000000..f3110156c8 --- /dev/null +++ b/pkg/management/api/grpc/management.swagger.json @@ -0,0 +1,5657 @@ +{ + "swagger": "2.0", + "info": { + "title": "Management API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/management" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/{id}/changes": { + "get": { + "operationId": "ApplicationChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/authgrants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchAuthGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/orgs/domain/{domain}": { + "get": { + "operationId": "GetOrgByDomainGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "domain", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/users/email/{email}": { + "get": { + "operationId": "GetUserByEmailGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "email", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/grants/{id}": { + "get": { + "summary": "GRANTED_PROJECT_GRANTS", + "operationId": "GetGrantedProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/healthz": { + "get": { + "summary": "READINESS", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/members/roles": { + "get": { + "summary": "ORG_MEMBERS", + "operationId": "GetOrgMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}": { + "get": { + "summary": "ORG", + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_deactivate": { + "put": { + "operationId": "DeactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_reactivate": { + "put": { + "operationId": "ReactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/changes": { + "get": { + "operationId": "OrgChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members": { + "post": { + "operationId": "AddOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AddOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/_search": { + "post": { + "operationId": "SearchOrgMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ChangeOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age": { + "get": { + "summary": "PASSWORD_AGE_POLICY", + "operationId": "GetPasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age/{id}": { + "delete": { + "operationId": "DeletePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity": { + "get": { + "summary": "PASSWORD_COMPLEXITY_POLICY", + "operationId": "GetPasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity/{id}": { + "delete": { + "operationId": "DeletePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout": { + "get": { + "summary": "PASSWORD_LOCKOUT_POLICY", + "operationId": "GetPasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout/{id}": { + "delete": { + "operationId": "DeletePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_GRANT_USER_GRANT", + "operationId": "SearchProjectGrantUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects": { + "post": { + "operationId": "CreateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectCreateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/_search": { + "post": { + "summary": "PROJECTS", + "operationId": "SearchProjects", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/grants/members/roles": { + "get": { + "summary": "PROJECT_GRANT_MEMBER", + "operationId": "GetProjectGrantMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/members/roles": { + "get": { + "summary": "PROJECT_MEMBERS", + "operationId": "GetProjectMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}": { + "get": { + "operationId": "ProjectByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUpdateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/changes": { + "get": { + "operationId": "ProjectChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members": { + "post": { + "operationId": "AddProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles": { + "post": { + "operationId": "AddProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles/{name}": { + "delete": { + "operationId": "RemoveProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "name", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/_search": { + "post": { + "summary": "APPLICATIONS", + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{application_id}/oidcconfig": { + "put": { + "operationId": "UpdateApplicationOIDCConfig", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "application_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCConfigUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}": { + "get": { + "operationId": "ApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_deactivate": { + "put": { + "operationId": "DeactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_reactivate": { + "put": { + "operationId": "ReactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret": { + "put": { + "operationId": "RegenerateOIDCClientSecret", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ClientSecret" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants": { + "post": { + "operationId": "CreateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/_search": { + "post": { + "summary": "PROJECT_GRANT", + "operationId": "SearchProjectGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members": { + "post": { + "operationId": "AddProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/_search": { + "post": { + "operationId": "SearchProjectGrantMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/members/_search": { + "post": { + "operationId": "SearchProjectMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/oidcapplications": { + "post": { + "operationId": "CreateOIDCApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCApplicationCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/roles/_search": { + "post": { + "summary": "PROJECT_ROLES", + "operationId": "SearchProjectRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_USER_GRANT", + "operationId": "SearchProjectUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/users": { + "post": { + "operationId": "CreateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateUserRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_isunique": { + "get": { + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_search": { + "post": { + "operationId": "SearchUsers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/grants/_search": { + "post": { + "summary": "USER_GRANT", + "operationId": "SearchUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "USER", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "delete": { + "operationId": "DeleteUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_lock": { + "put": { + "operationId": "LockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_sendsetpwnotify": { + "post": { + "summary": "PASSWORD\nSends an Notification (Email/SMS) with a password reset Link", + "operationId": "SendSetPasswordNotification", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SetPasswordNotificationRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_setinitialpw": { + "post": { + "summary": "A Manager is only allowed to set an initial password, on the next login the user has to change his password", + "operationId": "SetInitialPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_unlock": { + "put": { + "operationId": "UnlockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/address": { + "get": { + "summary": "USER_ADDRESS", + "operationId": "GetUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/changes": { + "get": { + "operationId": "UserChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email": { + "get": { + "summary": "USER_EMAIL", + "operationId": "GetUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/mfas": { + "get": { + "summary": "MFA", + "operationId": "GetUserMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone": { + "get": { + "summary": "USER_PHONE", + "operationId": "GetUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone/_resendverification": { + "post": { + "operationId": "ResendPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/profile": { + "get": { + "summary": "USER_PROFILE", + "operationId": "GetUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants": { + "post": { + "operationId": "CreateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}": { + "get": { + "operationId": "UserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "ManagementService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AddOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationID": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSERACHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_NAME" + ], + "default": "APPLICATIONSERACHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1ApplicationUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1AuthGrant": { + "type": "object", + "properties": { + "orgId": { + "type": "string" + }, + "projectId": { + "type": "string" + }, + "userId": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AuthGrantSearchKey": { + "type": "string", + "enum": [ + "AUTHGRANTSEARCHKEY_UNSPECIFIED", + "AUTHGRANTSEARCHKEY_ORG_ID", + "AUTHGRANTSEARCHKEY_PROJECT_ID", + "AUTHGRANTSEARCHKEY_USER_ID" + ], + "default": "AUTHGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1AuthGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1AuthGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrantSearchQuery" + } + } + } + }, + "v1AuthGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrant" + } + } + } + }, + "v1Change": { + "type": "object", + "properties": { + "change_date": { + "type": "string", + "format": "date-time" + }, + "event_type": { + "type": "string" + }, + "sequence": { + "type": "string", + "format": "uint64" + }, + "modifier": { + "type": "string" + }, + "data": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "v1ChangeOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1Changes": { + "type": "object", + "properties": { + "changes": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Change" + } + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ClientSecret": { + "type": "object", + "properties": { + "client_secret": { + "type": "string" + } + } + }, + "v1CreateUserRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCConfigUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "application_id": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_IMPLICIT", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1OrgMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1OrgMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OrgMemberSearchKey": { + "type": "string", + "enum": [ + "ORGMEMBERSEARCHKEY_UNSPECIFIED", + "ORGMEMBERSEARCHKEY_FIRST_NAME", + "ORGMEMBERSEARCHKEY_LAST_NAME", + "ORGMEMBERSEARCHKEY_EMAIL", + "ORGMEMBERSEARCHKEY_USER_ID" + ], + "default": "ORGMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1OrgMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgMemberSearchRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMemberSearchQuery" + } + } + } + }, + "v1OrgMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMember" + } + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1PasswordAgePolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordComplexityPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1PolicyState": { + "type": "string", + "enum": [ + "POLICYSTATE_UNSPECIFIED", + "POLICYSTATE_ACTIVE", + "POLICYSTATE_INACTIVE", + "POLICYSTATE_DELETED" + ], + "default": "POLICYSTATE_UNSPECIFIED" + }, + "v1Project": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1ProjectState" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "type": { + "$ref": "#/definitions/v1ProjectType" + }, + "resource_owner": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "grant_id": { + "type": "string" + } + } + }, + "v1ProjectCreateRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + } + } + }, + "v1ProjectGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "granted_org_name": { + "type": "string" + }, + "granted_org_domain": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1ProjectGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "project_name": { + "type": "string" + } + } + }, + "v1ProjectGrantCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectGrantMemberAdd": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberChange": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectGrantMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectGrantMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchQuery" + } + } + } + }, + "v1ProjectGrantMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMember" + } + } + } + }, + "v1ProjectGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ProjectGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + } + }, + "v1ProjectGrantState": { + "type": "string", + "enum": [ + "PROJECTGRANTSTATE_UNSPECIFIED", + "PROJECTGRANTSTATE_ACTIVE", + "PROJECTGRANTSTATE_INACTIVE" + ], + "default": "PROJECTGRANTSTATE_UNSPECIFIED" + }, + "v1ProjectGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_grant_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantID": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectGrantUserGrantUpdate": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1ProjectMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectMemberAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberChange": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTMEMBERSEARCHKEY_EMAIL", + "PROJECTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMemberSearchQuery" + } + } + } + }, + "v1ProjectMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMember" + } + } + } + }, + "v1ProjectRole": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchKey": { + "type": "string", + "enum": [ + "PROJECTROLESEARCHKEY_UNSPECIFIED", + "PROJECTROLESEARCHKEY_NAME", + "PROJECTROLESEARCHKEY_DISPLAY_NAME" + ], + "default": "PROJECTROLESEARCHKEY_UNSPECIFIED" + }, + "v1ProjectRoleSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectRoleSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRoleSearchQuery" + } + } + } + }, + "v1ProjectRoleSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRole" + } + } + } + }, + "v1ProjectSearchKey": { + "type": "string", + "enum": [ + "PROJECTSEARCHKEY_UNSPECIFIED", + "PROJECTSEARCHKEY_PROJECT_NAME" + ], + "default": "PROJECTSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectSearchQuery" + } + } + } + }, + "v1ProjectSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Project" + } + } + } + }, + "v1ProjectState": { + "type": "string", + "enum": [ + "PROJECTSTATE_UNSPECIFIED", + "PROJECTSTATE_ACTIVE", + "PROJECTSSTATE_INACTIVE" + ], + "default": "PROJECTSTATE_UNSPECIFIED" + }, + "v1ProjectType": { + "type": "string", + "enum": [ + "PROJECTTYPE_UNKNOWN", + "PROJECTTYPE_SELF", + "PROJECTTYPE_GRANTED" + ], + "default": "PROJECTTYPE_UNKNOWN" + }, + "v1ProjectUpdateRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1ProjectUserGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectUserGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SetPasswordNotificationRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1UserGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "project_name": { + "type": "string" + } + } + }, + "v1UserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserGrantID": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1UserGrantSearchKey": { + "type": "string", + "enum": [ + "USERGRANTSEARCHKEY_UNSPECIFIED", + "USERGRANTSEARCHKEY_PROJECT_ID", + "USERGRANTSEARCHKEY_USER_ID", + "USERGRANTSEARCHKEY_ORG_ID" + ], + "default": "USERGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1UserGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1UserGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrant" + } + } + } + }, + "v1UserGrantState": { + "type": "string", + "enum": [ + "USERGRANTSTATE_UNSPECIFIED", + "USERGRANTSTATE_ACTIVE", + "USERGRANTSTATE_INACTIVE" + ], + "default": "USERGRANTSTATE_UNSPECIFIED" + }, + "v1UserGrantUpdate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSearchKey": { + "type": "string", + "enum": [ + "USERSEARCHKEY_UNSPECIFIED", + "USERSEARCHKEY_USER_NAME", + "USERSEARCHKEY_FIRST_NAME", + "USERSEARCHKEY_LAST_NAME", + "USERSEARCHKEY_NICK_NAME", + "USERSEARCHKEY_DISPLAY_NAME", + "USERSEARCHKEY_EMAIL", + "USERSEARCHKEY_STATE" + ], + "default": "USERSEARCHKEY_UNSPECIFIED" + }, + "v1UserSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSearchQuery" + } + } + } + }, + "v1UserSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1User" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/management/api/grpc/org.go b/pkg/management/api/grpc/org.go new file mode 100644 index 0000000000..1062aa154e --- /dev/null +++ b/pkg/management/api/grpc/org.go @@ -0,0 +1,26 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetOrgByID(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sdo5g", "Not implemented") +} + +func (s *Server) GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mop4s", "Not implemented") +} + +func (s *Server) DeactivateOrg(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-vel3X", "Not implemented") +} + +func (s *Server) ReactivateOrg(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Scmk3", "Not implemented") +} + +func (s *Server) OrgChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mfiF4", "Not implemented") +} diff --git a/pkg/management/api/grpc/org_member.go b/pkg/management/api/grpc/org_member.go new file mode 100644 index 0000000000..d80922ff24 --- /dev/null +++ b/pkg/management/api/grpc/org_member.go @@ -0,0 +1,27 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetOrgMemberRoles(ctx context.Context, _ *empty.Empty) (*OrgMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wz4vc", "Not implemented") +} + +func (s *Server) SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wkdl3", "Not implemented") +} + +func (s *Server) AddOrgMember(ctx context.Context, member *AddOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Moe56", "Not implemented") +} + +func (s *Server) ChangeOrgMember(ctx context.Context, member *ChangeOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-eod34", "Not implemented") +} + +func (s *Server) RemoveOrgMember(ctx context.Context, member *RemoveOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poeSw", "Not implemented") +} diff --git a/pkg/management/api/grpc/policy.go b/pkg/management/api/grpc/policy.go new file mode 100644 index 0000000000..4a49550953 --- /dev/null +++ b/pkg/management/api/grpc/policy.go @@ -0,0 +1,55 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetPasswordComplexityPolicy(ctx context.Context, _ *empty.Empty) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-swe5v", "Not implemented") +} + +func (s *Server) CreatePasswordComplexityPolicy(ctx context.Context, policy *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lo34s", "Not implemented") +} + +func (s *Server) UpdatePasswordComplexityPolicy(ctx context.Context, policy *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl8fs", "Not implemented") +} + +func (s *Server) DeletePasswordComplexityPolicy(ctx context.Context, ID *PasswordComplexityPolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-skw3f", "Not implemented") +} + +func (s *Server) GetPasswordAgePolicy(ctx context.Context, _ *empty.Empty) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po9vb", "Not implemented") +} + +func (s *Server) CreatePasswordAgePolicy(ctx context.Context, policy *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldp3v", "Not implemented") +} + +func (s *Server) UpdatePasswordAgePolicy(ctx context.Context, policy *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ckep3", "Not implemented") +} + +func (s *Server) DeletePasswordAgePolicy(ctx context.Context, ID *PasswordAgePolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plo67", "Not implemented") +} + +func (s *Server) GetPasswordLockoutPolicy(ctx context.Context, _ *empty.Empty) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-GHkd9", "Not implemented") +} + +func (s *Server) CreatePasswordLockoutPolicy(ctx context.Context, policy *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mdk3c", "Not implemented") +} + +func (s *Server) UpdatePasswordLockoutPolicy(ctx context.Context, policy *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8dbN4", "Not implemented") +} + +func (s *Server) DeletePasswordLockoutPolicy(ctx context.Context, ID *PasswordLockoutPolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV53", "Not implemented") +} diff --git a/pkg/management/api/grpc/probes.go b/pkg/management/api/grpc/probes.go new file mode 100644 index 0000000000..3debbea5e2 --- /dev/null +++ b/pkg/management/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mkd3y", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl6BM", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2wxF", "Not implemented") +} diff --git a/pkg/management/api/grpc/project.go b/pkg/management/api/grpc/project.go new file mode 100644 index 0000000000..133e62202a --- /dev/null +++ b/pkg/management/api/grpc/project.go @@ -0,0 +1,47 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) CreateProject(ctx context.Context, in *ProjectCreateRequest) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mo34X", "Not implemented") +} +func (s *Server) UpdateProject(ctx context.Context, in *ProjectUpdateRequest) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0o4fB", "Not implemented") +} +func (s *Server) DeactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-4Sck8", "Not implemented") +} +func (s *Server) ReactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0oVre", "Not implemented") +} + +func (s *Server) SearchProjects(ctx context.Context, in *ProjectSearchRequest) (*ProjectSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2sFvd", "Not implemented") +} + +func (s *Server) ProjectByID(ctx context.Context, id *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV5x", "Not implemented") +} + +func (s *Server) GetGrantedProjectGrantByID(ctx context.Context, request *GrantedGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-974vd", "Not implemented") +} + +func (s *Server) AddProjectRole(ctx context.Context, in *ProjectRoleAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0ow2C", "Not implemented") +} +func (s *Server) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bm6iB", "Not implemented") +} + +func (s *Server) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV56", "Not implemented") +} + +func (s *Server) ProjectChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mci3f", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_grant.go b/pkg/management/api/grpc/project_grant.go new file mode 100644 index 0000000000..fb70cdd648 --- /dev/null +++ b/pkg/management/api/grpc/project_grant.go @@ -0,0 +1,32 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetProjectGrantMemberRoles(ctx context.Context, _ *empty.Empty) (*ProjectGrantMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mGo89", "Not implemented") +} + +func (s *Server) SearchProjectGrants(ctx context.Context, request *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po9fs", "Not implemented") +} + +func (s *Server) ProjectGrantByID(ctx context.Context, request *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nmr54", "Not implemented") +} + +func (s *Server) CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-fi45f", "Not implemented") +} +func (s *Server) UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nm7Ds", "Not implemented") +} +func (s *Server) DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-xkwpr", "Not implemented") +} +func (s *Server) ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mdk23", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_grant_member.go b/pkg/management/api/grpc/project_grant_member.go new file mode 100644 index 0000000000..063934f0d3 --- /dev/null +++ b/pkg/management/api/grpc/project_grant_member.go @@ -0,0 +1,23 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) SearchProjectGrantMembers(ctx context.Context, request *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pldE4", "Not implemented") +} + +func (s *Server) AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po8r3", "Not implemented") +} + +func (s *Server) ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asd3c", "Not implemented") +} + +func (s *Server) RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-04kfs", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_member.go b/pkg/management/api/grpc/project_member.go new file mode 100644 index 0000000000..78f21a2657 --- /dev/null +++ b/pkg/management/api/grpc/project_member.go @@ -0,0 +1,27 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetProjectMemberRoles(ctx context.Context, _ *empty.Empty) (*ProjectMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-qw34d", "Not implemented") +} + +func (s *Server) SearchProjectMembers(ctx context.Context, request *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-PLr84", "Not implemented") +} + +func (s *Server) AddProjectMember(ctx context.Context, in *ProjectMemberAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-c2dks", "Not implemented") +} + +func (s *Server) ChangeProjectMember(ctx context.Context, in *ProjectMemberChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cms47", "Not implemented") +} + +func (s *Server) RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-olw21", "Not implemented") +} diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go new file mode 100644 index 0000000000..33af61d559 --- /dev/null +++ b/pkg/management/api/grpc/server.go @@ -0,0 +1,37 @@ +package grpc + +import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" + "google.golang.org/grpc" +) + +var _ ManagementServiceServer = (*Server)(nil) + +type Server struct { + port string +} + +func StartServer(conf grpc_util.ServerConfig) *Server { + return &Server{ + port: conf.Port, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + middleware.ErrorHandler(), + ), + ), + ) + RegisterManagementServiceServer(gs, s) + return gs, nil +} diff --git a/pkg/management/api/grpc/user.go b/pkg/management/api/grpc/user.go new file mode 100644 index 0000000000..c6a72965a5 --- /dev/null +++ b/pkg/management/api/grpc/user.go @@ -0,0 +1,103 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetUserByID(ctx context.Context, userID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0oVbs", "Not implemented") +} + +func (s *Server) GetUserByEmailGlobal(ctx context.Context, email *UserEmailID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9djSw", "Not implemented") +} + +func (s *Server) SearchUsers(ctx context.Context, userSearch *UserSearchRequest) (*UserSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-as2Dc", "Not implemented") +} + +func (s *Server) UserChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl6Zu", "Not implemented") +} + +func (s *Server) IsUserUnique(ctx context.Context, request *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-olF56", "Not implemented") +} + +func (s *Server) CreateUser(ctx context.Context, request *CreateUserRequest) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sd4fs", "Not implemented") +} + +func (s *Server) DeactivateUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Vgh64", "Not implemented") +} + +func (s *Server) ReactivateUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mCx4f", "Not implemented") +} + +func (s *Server) LockUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ds4fd", "Not implemented") +} + +func (s *Server) UnlockUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-MV7dd", "Not implemented") +} + +func (s *Server) DeleteUser(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-as4fg", "Not implemented") +} + +func (s *Server) GetUserProfile(ctx context.Context, ID *UserID) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mT67d", "Not implemented") +} + +func (s *Server) UpdateUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asje3", "Not implemented") +} + +func (s *Server) GetUserEmail(ctx context.Context, ID *UserID) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-peo9d", "Not implemented") +} + +func (s *Server) ChangeUserEmail(ctx context.Context, request *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cloeS", "Not implemented") +} + +func (s *Server) ResendEmailVerificationMail(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dwsP9", "Not implemented") +} + +func (s *Server) GetUserPhone(ctx context.Context, ID *UserID) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wlf7f", "Not implemented") +} + +func (s *Server) ChangeUserPhone(ctx context.Context, request *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pld5g", "Not implemented") +} + +func (s *Server) ResendPhoneVerificationCode(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-98hdE", "Not implemented") +} + +func (s *Server) GetUserAddress(ctx context.Context, ID *UserID) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plt67", "Not implemented") +} + +func (s *Server) UpdateUserAddress(ctx context.Context, request *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dleo3", "Not implemented") +} + +func (s *Server) SendSetPasswordNotification(ctx context.Context, request *SetPasswordNotificationRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-LSe7s", "Not implemented") +} + +func (s *Server) SetInitialPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldo3s", "Not implemented") +} + +func (s *Server) GetUserMfas(ctx context.Context, userID *UserID) (*MultiFactors, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldmw3", "Not implemented") +} diff --git a/pkg/management/api/grpc/user_grant.go b/pkg/management/api/grpc/user_grant.go new file mode 100644 index 0000000000..6751ef2684 --- /dev/null +++ b/pkg/management/api/grpc/user_grant.go @@ -0,0 +1,73 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchUserGrants(ctx context.Context, request *UserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk3ds", "Not implemented") +} + +func (s *Server) UserGrantByID(ctx context.Context, request *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9dksF", "Not implemented") +} + +func (s *Server) CreateUserGrant(ctx context.Context, in *UserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2kdl2", "Not implemented") +} +func (s *Server) UpdateUserGrant(ctx context.Context, in *UserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-83jsF", "Not implemented") +} +func (s *Server) DeactivateUserGrant(ctx context.Context, in *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-93dj3", "Not implemented") +} +func (s *Server) ReactivateUserGrant(ctx context.Context, in *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2kSfs", "Not implemented") +} + +func (s *Server) SearchProjectUserGrants(ctx context.Context, request *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8jdSw", "Not implemented") +} + +func (s *Server) ProjectUserGrantByID(ctx context.Context, request *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk32s", "Not implemented") +} + +func (s *Server) CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0or5G", "Not implemented") +} +func (s *Server) UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asl4D", "Not implemented") +} + +func (s *Server) DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2fG6h", "Not implemented") +} + +func (s *Server) ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-03kSc", "Not implemented") +} + +func (s *Server) SearchProjectGrantUserGrants(ctx context.Context, request *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-32sFs", "Not implemented") +} + +func (s *Server) ProjectGrantUserGrantByID(ctx context.Context, request *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9kfSc", "Not implemented") +} + +func (s *Server) CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-293md", "Not implemented") +} +func (s *Server) UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-76fGe", "Not implemented") +} + +func (s *Server) DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sFsi3", "Not implemented") +} + +func (s *Server) ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ckr56", "Not implemented") +} diff --git a/pkg/management/api/proto/management.proto b/pkg/management/api/proto/management.proto new file mode 100644 index 0000000000..8fe7c857e4 --- /dev/null +++ b/pkg/management/api/proto/management.proto @@ -0,0 +1,2164 @@ +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/struct.proto"; +import "google/protobuf/timestamp.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "validate/validate.proto"; +import "google/protobuf/descriptor.proto"; +import "authoption/options.proto"; + +package caos.zitadel.management.api.v1; + +option go_package = "github.com/caos/zitadel/pkg/management/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "Management API"; + version: "0.1"; + contact:{ + url: "https://github.com/caos/zitadel/pkg/management" + }; + }; + + schemes: HTTPS; + + consumes: "application/json"; + consumes: "application/grpc"; + + produces: "application/json"; + produces: "application/grpc"; +}; + +service ManagementService { + //READINESS + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + + //USER + rpc GetUserByID(UserID) returns (User) { + option (google.api.http) = { + get: "/users/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc GetUserByEmailGlobal(UserEmailID) returns (User) { + option (google.api.http) = { + get: "/global/users/email/{email}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc SearchUsers(UserSearchRequest) returns (UserSearchResponse) { + option (google.api.http) = { + post: "/users/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) { + option (google.api.http) = { + get: "/users/_isunique" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc CreateUser(CreateUserRequest) returns (User) { + option (google.api.http) = { + post: "/users" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc DeactivateUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ReactivateUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc LockUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_lock" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc UnlockUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_unlock" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc DeleteUser(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/users/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.delete" + }; + } + + rpc UserChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/users/{id}/changes" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ApplicationChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/applications/{id}/changes" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.read" + }; + } + + rpc OrgChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/orgs/{id}/changes" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc ProjectChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/projects/{id}/changes" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + //USER_PROFILE + rpc GetUserProfile(UserID) returns (UserProfile) { + option (google.api.http) = { + get: "/users/{id}/profile" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc UpdateUserProfile(UpdateUserProfileRequest) returns (UserProfile) { + option (google.api.http) = { + put: "/users/{id}/profile" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_EMAIL + rpc GetUserEmail(UserID) returns (UserEmail) { + option (google.api.http) = { + get: "/users/{id}/email" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ChangeUserEmail(UpdateUserEmailRequest) returns (UserEmail) { + option (google.api.http) = { + put: "/users/{id}/email" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/email/_resendverification" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_PHONE + rpc GetUserPhone(UserID) returns (UserPhone) { + option (google.api.http) = { + get: "/users/{id}/phone" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ChangeUserPhone(UpdateUserPhoneRequest) returns (UserPhone) { + option (google.api.http) = { + put: "/users/{id}/phone" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ResendPhoneVerificationCode(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/phone/_resendverification" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_ADDRESS + rpc GetUserAddress(UserID) returns (UserAddress) { + option (google.api.http) = { + get: "/users/{id}/address" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc UpdateUserAddress(UpdateUserAddressRequest) returns (UserAddress) { + option (google.api.http) = { + put: "/users/{id}/address" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + //MFA + rpc GetUserMfas(UserID) returns (MultiFactors) { + option (google.api.http) = { + get: "/users/{id}/mfas" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + rpc SendSetPasswordNotification(SetPasswordNotificationRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/_sendsetpwnotify" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + rpc SetInitialPassword(PasswordRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/_setinitialpw" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + + //PASSWORD_COMPLEXITY_POLICY + rpc GetPasswordComplexityPolicy(google.protobuf.Empty) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + get: "/policies/passwords/complexity" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordComplexityPolicy(PasswordComplexityPolicyCreate) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + post: "/policies/passwords/complexity" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordComplexityPolicy(PasswordComplexityPolicyUpdate) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + put: "/policies/passwords/complexity/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordComplexityPolicy(PasswordComplexityPolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/complexity/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //PASSWORD_AGE_POLICY + rpc GetPasswordAgePolicy(google.protobuf.Empty) returns (PasswordAgePolicy) { + option (google.api.http) = { + get: "/policies/passwords/age" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordAgePolicy(PasswordAgePolicyCreate) returns (PasswordAgePolicy) { + option (google.api.http) = { + post: "/policies/passwords/age" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordAgePolicy(PasswordAgePolicyUpdate) returns (PasswordAgePolicy) { + option (google.api.http) = { + put: "/policies/passwords/age/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordAgePolicy(PasswordAgePolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/age/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //PASSWORD_LOCKOUT_POLICY + rpc GetPasswordLockoutPolicy(google.protobuf.Empty) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + get: "/policies/passwords/lockout" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordLockoutPolicy(PasswordLockoutPolicyCreate) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + post: "/policies/passwords/lockout" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordLockoutPolicy(PasswordLockoutPolicyUpdate) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + put: "/policies/passwords/lockout/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordLockoutPolicy(PasswordLockoutPolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/lockout/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //ORG + rpc GetOrgByID(OrgID) returns (Org) { + option (google.api.http) = { + get: "/orgs/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc GetOrgByDomainGlobal(OrgDomain) returns (Org) { + option (google.api.http) = { + get: "/global/orgs/domain/{domain}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc DeactivateOrg(OrgID) returns (Org) { + option (google.api.http) = { + put: "/orgs/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.write" + }; + } + + rpc ReactivateOrg(OrgID) returns (Org) { + option (google.api.http) = { + put: "/orgs/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.write" + }; + } + + //ORG_MEMBERS + rpc GetOrgMemberRoles(google.protobuf.Empty) returns (OrgMemberRoles) { + option (google.api.http) = { + get: "/orgs/members/roles" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.member.read" + }; + } + + rpc AddOrgMember(AddOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/orgs/{org_id}/members" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.member.write" + }; + } + + rpc ChangeOrgMember(ChangeOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/orgs/{org_id}/members/{user_id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.member.write" + }; + } + + rpc RemoveOrgMember(RemoveOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/orgs/{org_id}/members/{user_id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.member.delete" + }; + } + + rpc SearchOrgMembers(OrgMemberSearchRequest) returns (OrgMemberSearchResponse) { + option (google.api.http) = { + post: "/orgs/{org_id}/members/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "org.member.read" + }; + } + + //PROJECTS + rpc SearchProjects(ProjectSearchRequest) returns (ProjectSearchResponse) { + option (google.api.http) = { + post: "/projects/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + rpc ProjectByID(ProjectID) returns (Project) { + option (google.api.http) = { + get: "/projects/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.read" + check_field_name: "Id" + }; + } + + rpc CreateProject(ProjectCreateRequest) returns (Project) { + option (google.api.http) = { + post: "/projects" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.write" + }; + } + + rpc UpdateProject(ProjectUpdateRequest) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + rpc DeactivateProject(ProjectID) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + rpc ReactivateProject(ProjectID) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + //GRANTED_PROJECT_GRANTS + rpc GetGrantedProjectGrantByID(GrantedGrantID) returns (ProjectGrant) { + option (google.api.http) = { + get: "/grants/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + //PROJECT_MEMBERS + rpc GetProjectMemberRoles(google.protobuf.Empty) returns (ProjectMemberRoles) { + option (google.api.http) = { + get: "/projects/members/roles" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.member.read" + }; + } + + rpc SearchProjectMembers(ProjectMemberSearchRequest) returns (ProjectMemberSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/members/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.member.read" + check_field_name: "ProjectId" + }; + } + + rpc AddProjectMember(ProjectMemberAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{id}/members" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.member.write" + check_field_name: "Id" + }; + } + + rpc ChangeProjectMember(ProjectMemberChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/projects/{id}/members/{user_id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.member.write" + check_field_name: "Id" + }; + } + + rpc RemoveProjectMember(ProjectMemberRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{id}/members/{user_id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.member.delete" + check_field_name: "Id" + }; + } + + //PROJECT_ROLES + rpc SearchProjectRoles(ProjectRoleSearchRequest) returns (ProjectRoleSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/roles/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.role.read" + check_field_name: "ProjectId" + }; + } + + rpc AddProjectRole(ProjectRoleAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{id}/roles" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.role.write" + check_field_name: "Id" + }; + } + + rpc RemoveProjectRole(ProjectRoleRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{id}/roles/{name}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.role.delete" + check_field_name: "Id" + }; + } + + //APPLICATIONS + rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/applications/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.read" + check_field_name: "ProjectId" + }; + } + + rpc ApplicationByID(ApplicationID) returns (Application) { + option (google.api.http) = { + get: "/projects/{project_id}/applications/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.read" + check_field_name: "ProjectId" + }; + } + + rpc CreateOIDCApplication(OIDCApplicationCreate) returns (Application) { + option (google.api.http) = { + post: "/projects/{project_id}/oidcapplications" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateApplication(ApplicationUpdate) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc DeactivateApplication(ApplicationID) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc ReactivateApplication(ApplicationID) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateApplicationOIDCConfig(OIDCConfigUpdate) returns (OIDCConfig) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{application_id}/oidcconfig" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc RegenerateOIDCClientSecret(ApplicationID) returns (ClientSecret) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + //PROJECT_GRANT + rpc SearchProjectGrants(ProjectGrantSearchRequest) returns (ProjectGrantSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc ProjectGrantByID(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + get: "/projects/{project_id}/grants/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.read" + }; + } + + rpc CreateProjectGrant(ProjectGrantCreate) returns (ProjectGrant) { + option (google.api.http) = { + post: "/projects/{project_id}/grants" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc UpdateProjectGrant(ProjectGrantUpdate) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc DeactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc ReactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + + //PROJECT_GRANT_MEMBER + rpc GetProjectGrantMemberRoles(google.protobuf.Empty) returns (ProjectGrantMemberRoles) { + option (google.api.http) = { + get: "/projects/grants/members/roles" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.member.read" + }; + } + rpc SearchProjectGrantMembers(ProjectGrantMemberSearchRequest) returns (ProjectGrantMemberSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/{grant_id}/members/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.member.read" + }; + } + + rpc AddProjectGrantMember(ProjectGrantMemberAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/{grant_id}/members" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.member.write" + }; + } + + rpc ChangeProjectGrantMember(ProjectGrantMemberChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{grant_id}/members/{user_id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.member.write" + }; + } + + rpc RemoveProjectGrantMember(ProjectGrantMemberRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.member.delete" + }; + } + + + //USER_GRANT + rpc SearchUserGrants(UserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/users/grants/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.read" + }; + } + + rpc UserGrantByID(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/users/{user_id}/grants/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.read" + }; + } + + rpc CreateUserGrant(UserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/users/{user_id}/grants" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc UpdateUserGrant(UserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc DeactivateUserGrant(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc ReactivateUserGrant(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + //PROJECT_USER_GRANT + rpc SearchProjectUserGrants(ProjectUserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/users/grants/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc ProjectUserGrantByID(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/projects/{project_id}/users/{user_id}/grants/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc CreateProjectUserGrant(UserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/projects/{project_id}/users/{user_id}/grants" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateProjectUserGrant(ProjectUserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc DeactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc ReactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + //PROJECT_GRANT_USER_GRANT + rpc SearchProjectGrantUserGrants(ProjectGrantUserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/projectgrants/{project_grant_id}/users/grants/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.read" + check_field_name: "ProjectGrantId" + }; + } + + rpc ProjectGrantUserGrantByID(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.read" + check_field_name: "ProjectGrantId" + }; + } + + rpc CreateProjectGrantUserGrant(ProjectGrantUserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/projectgrants/{project_grant_id}/users/{user_id}/grants" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc UpdateProjectGrantUserGrant(ProjectGrantUserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc DeactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc ReactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + //Grant + rpc SearchAuthGrant(AuthGrantSearchRequest) returns (AuthGrantSearchResponse) { + option (google.api.http) = { + post: "/authgrants/_search" + body: "*" + }; + } +} + +message ChangeRequest { + string id = 1; + uint64 limit= 2; + uint64 sequence_offset = 3; +} + +message Changes { + repeated Change changes = 1; + uint64 offset = 2; + uint64 limit = 3; +} + +message Change { + google.protobuf.Timestamp change_date = 1; + string event_type = 2; + uint64 sequence = 3; + string modifier = 4; + google.protobuf.Struct data = 5; +} + +message ApplicationID { + string id = 1; + string project_id = 2; +} + +message ProjectID { + string id = 1; +} + +message UserID { + string id = 1; +} + +message UserEmailID { + string email = 1; +} + +message UniqueUserRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UniqueUserResponse { + bool is_unique = 1; +} + +message CreateUserRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5[(validate.rules).string = {max_len: 200}]; + string preferred_language = 6[(validate.rules).string = {max_len: 200}]; + Gender gender = 7; + string email = 8 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; + bool is_email_verified = 9; + string phone = 11 [(validate.rules).string = {max_len: 20}]; + bool is_phone_verified = 12; + string country = 13 [(validate.rules).string = {max_len: 200}]; + string locality = 14 [(validate.rules).string = {max_len: 200}]; + string postal_code = 15 [(validate.rules).string = {max_len: 200}]; + string region = 16 [(validate.rules).string = {max_len: 200}]; + string street_address = 17 [(validate.rules).string = {max_len: 200}]; + string password = 18 [(validate.rules).string = {max_len: 72}]; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + google.protobuf.Timestamp last_login = 5; + google.protobuf.Timestamp password_changed = 6; + string user_name = 7; + string first_name = 8; + string last_name = 9; + string display_name = 10; + string nick_name = 11; + string preferred_language = 12; + Gender gender = 13; + string email = 14; + bool is_email_verified = 15; + string phone = 16; + bool is_phone_verified = 17; + string country = 18; + string locality = 19; + string postal_code = 20; + string region = 21; + string street_address = 22; +} + +enum UserState { + USERSTATE_UNSPECIFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message UserSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + UserSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated UserSearchQuery queries = 5; +} + +message UserSearchQuery { + UserSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum UserSearchKey { + USERSEARCHKEY_UNSPECIFIED = 0; + USERSEARCHKEY_USER_NAME = 1; + USERSEARCHKEY_FIRST_NAME = 2; + USERSEARCHKEY_LAST_NAME = 3; + USERSEARCHKEY_NICK_NAME = 4; + USERSEARCHKEY_DISPLAY_NAME = 5; + USERSEARCHKEY_EMAIL = 6; + USERSEARCHKEY_STATE = 7; +} + +message UserSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated User result = 4; +} + +enum SearchMethod { + SEARCHMETHOD_EQUALS = 0; + SEARCHMETHOD_STARTS_WITH = 1; + SEARCHMETHOD_CONTAINS = 2; +} + + +message UserProfile { + string id = 1; + UserState state = 2; + string first_name = 3; + string last_name = 4; + string nick_name = 5; + string display_name = 6; + string preferred_language = 7; + Gender gender = 8; + string user_name = 9; +} + +message UpdateUserProfileRequest { + string id = 1; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5 [(validate.rules).string = {max_len: 200}]; + string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; + Gender gender = 7; +} + +message UserEmail { + string id = 1; + string email = 2; + bool is_email_verified = 3; +} + +message UpdateUserEmailRequest { + string id = 1; + string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + bool is_email_verified = 3; +} + +message UserPhone { + string id = 1; + string phone = 2; + bool is_phone_verified = 3; +} + +message UpdateUserPhoneRequest { + string id = 1; + string phone = 2 [(validate.rules).string = {min_len: 1, max_len: 20}]; + bool is_phone_verified = 3; +} + +message UserAddress { + string id = 1; + string country = 2; + string locality = 3; + string postal_code = 4; + string region = 5; + string street_address = 6; +} + +message UpdateUserAddressRequest { + string id = 1; + string country = 2 [(validate.rules).string = {max_len: 200}]; + string locality = 3 [(validate.rules).string = {max_len: 200}]; + string postal_code = 4 [(validate.rules).string = {max_len: 200}]; + string region = 5 [(validate.rules).string = {max_len: 200}]; + string street_address = 6 [(validate.rules).string = {max_len: 200}]; +} + +message MultiFactors { + repeated MultiFactor mfas = 1; +} + +message MultiFactor { + MfaType type = 1; + MFAState state = 2; +} + +enum MfaType { + MFATYPE_UNSPECIFIED = 0; + MFATYPE_SMS = 1; + MFATYPE_OTP = 2; +} + +enum MFAState { + MFASTATE_UNSPECIFIED = 0; + MFASTATE_NOT_READY = 1; + MFASTATE_READY = 2; + MFASTATE_REMOVED = 3; +} + +message PasswordID{ + string id = 1; +} + +message PasswordRequest { + string id = 1; + string password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +message ResetPasswordRequest { + string id = 1; +} + +message SetPasswordNotificationRequest { + string id = 1; + NotificationType type = 2; +} + +enum NotificationType { + NOTIFICATIONTYPE_EMAIL = 0; + NOTIFICATIONTYPE_SMS = 1; +} + +message PasswordComplexityPolicyID { + string id = 1; +} + +message PasswordComplexityPolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 min_length = 6; + bool has_lowercase = 7; + bool has_uppercase = 8; + bool has_number = 9; + bool has_symbol = 10; +} + +message PasswordComplexityPolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 min_length = 2; + bool has_lowercase = 3; + bool has_uppercase = 4; + bool has_number = 5; + bool has_symbol = 6; +} + +message PasswordComplexityPolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 min_length = 3; + bool has_lowercase = 4; + bool has_uppercase = 5; + bool has_number = 6; + bool has_symbol = 7; +} + +message PasswordAgePolicyID { + string id = 1; +} + +message PasswordAgePolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 max_age_days = 6; + uint64 expire_warn_days = 7; +} + +message PasswordAgePolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 max_age_days = 2; + uint64 expire_warn_days = 3; +} + +message PasswordAgePolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 max_age_days = 3; + uint64 expire_warn_days = 4; +} + +message PasswordLockoutPolicyID { + string id = 1; +} + +message PasswordLockoutPolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 max_attempts = 6; + bool show_lock_out_failures = 7; +} + +message PasswordLockoutPolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 max_attempts = 2; + bool show_lock_out_failures = 3; +} + +message PasswordLockoutPolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 max_attempts = 3; + bool show_lock_out_failures = 4; +} + +enum PolicyState { + POLICYSTATE_UNSPECIFIED = 0; + POLICYSTATE_ACTIVE = 1; + POLICYSTATE_INACTIVE = 2; + POLICYSTATE_DELETED = 3; +} + +message OrgID { + string id = 1; +} + +message OrgDomain { + string domain = 1; +} + +message Org { + string id = 1; + OrgState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + string domain = 6; +} + +enum OrgState { + ORGSTATE_UNSPECIFIED = 0; + ORGSTATE_ACTIVE = 1; + ORGSTATE_INACTIVE = 2; +} + +message OrgMemberRoles { + repeated string roles = 1; +} + +message OrgMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message AddOrgMemberRequest { + string org_id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ChangeOrgMemberRequest { + string org_id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message RemoveOrgMemberRequest { + string org_id = 1; + string user_id = 2; +} + +message OrgMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated OrgMember result = 4; +} + +message OrgMemberSearchRequest { + string org_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated OrgMemberSearchQuery queries = 4; +} + +message OrgMemberSearchQuery { + OrgMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum OrgMemberSearchKey { + ORGMEMBERSEARCHKEY_UNSPECIFIED = 0; + ORGMEMBERSEARCHKEY_FIRST_NAME = 1; + ORGMEMBERSEARCHKEY_LAST_NAME = 2; + ORGMEMBERSEARCHKEY_EMAIL = 3; + ORGMEMBERSEARCHKEY_USER_ID = 4; +} + +message ProjectCreateRequest { + string name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message ProjectUpdateRequest { + string id = 1; + string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message Projects { + repeated Project projects = 1; +} + +message Project { + string id = 1; + string name = 2; + ProjectState state = 3; + google.protobuf.Timestamp change_date = 4; + google.protobuf.Timestamp creation_date = 5; + ProjectType type = 6; + string resource_owner = 7; + string org_id = 8; + string org_name = 9; + string org_domain = 10; + string grant_id = 11; +} + +enum ProjectState { + PROJECTSTATE_UNSPECIFIED = 0; + PROJECTSTATE_ACTIVE = 1; + PROJECTSSTATE_INACTIVE = 2; +} + +enum ProjectType { + PROJECTTYPE_UNKNOWN = 0; + PROJECTTYPE_SELF = 1; + PROJECTTYPE_GRANTED = 2; +} + +message ProjectSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Project result = 4; +} + +message ProjectSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + repeated ProjectSearchQuery queries = 3; +} + +message ProjectSearchQuery { + ProjectSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectSearchKey { + PROJECTSEARCHKEY_UNSPECIFIED = 0; + PROJECTSEARCHKEY_PROJECT_NAME = 1; +} + +message ProjectMemberRoles { + repeated string roles = 1; +} + +message ProjectMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message ProjectMemberAdd { + string id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ProjectMemberChange { + string id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ProjectMemberRemove { + string id = 1; + string user_id = 2; +} + +message ProjectRoleAdd { + string id = 1; + string name = 2; + string display_name = 3; + string group = 4; +} + +message ProjectRole { + string project_id = 1; + string name = 2; + string display_name = 3; + google.protobuf.Timestamp creation_date = 4; + string group = 5; +} + +message ProjectRoleRemove { + string id = 1; + string name = 2; +} + +message ProjectRoleSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectRole result = 4; +} + +message ProjectRoleSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ProjectRoleSearchQuery queries = 4; +} + +message ProjectRoleSearchQuery { + ProjectRoleSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectRoleSearchKey { + PROJECTROLESEARCHKEY_UNSPECIFIED = 0; + PROJECTROLESEARCHKEY_NAME = 1; + PROJECTROLESEARCHKEY_DISPLAY_NAME = 2; +} + +message ProjectMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectMember result = 4; +} + +message ProjectMemberSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ProjectMemberSearchQuery queries = 4; +} + +message ProjectMemberSearchQuery { + ProjectMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectMemberSearchKey { + PROJECTMEMBERSEARCHKEY_UNSPECIFIED = 0; + PROJECTMEMBERSEARCHKEY_FIRST_NAME = 1; + PROJECTMEMBERSEARCHKEY_LAST_NAME = 2; + PROJECTMEMBERSEARCHKEY_EMAIL = 3; + PROJECTMEMBERSEARCHKEY_USER_ID = 4; +} + +enum AppState { + APPSTATE_UNSPECIFIED = 0; + APPSTATE_ACTIVE = 1; + APPSTATE_INACTIVE = 2; +} + +message Application { + string id = 1; + AppState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + oneof app_config { + OIDCConfig oidc_config = 8; + } +} + +message ApplicationUpdate { + string project_id = 1; + string id = 2; + string name = 5 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + + +message OIDCConfig { + repeated string redirect_uris = 1; + repeated OIDCResponseType response_types = 2; + repeated OIDCGrantType grant_types = 3; + OIDCApplicationType application_type = 4; + string client_id = 5; + string client_secret = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +message OIDCApplicationCreate { + string project_id = 1; + string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + repeated string redirect_uris = 3; + repeated OIDCResponseType response_types = 4; + repeated OIDCGrantType grant_types = 5; + OIDCApplicationType application_type = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +message OIDCConfigUpdate { + string project_id = 1; + string application_id = 2; + repeated string redirect_uris = 3; + repeated OIDCResponseType response_types = 4; + repeated OIDCGrantType grant_types = 5; + OIDCApplicationType application_type = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +enum OIDCResponseType { + OIDCRESPONSETYPE_CODE = 0; + OIDCRESPONSETYPE_ID_TOKEN = 1; + OIDCRESPONSETYPE_TOKEN_ID_TOKEN = 2; +} + +enum OIDCGrantType { + OIDCGRANTTYPE_AUTHORIZATION_CODE = 0; + OIDCGRANTTYPE_IMPLICIT = 1; + OIDCGRANTTYPE_REFRESH_TOKEN = 2; +} + +enum OIDCApplicationType { + OIDCAPPLICATIONTYPE_WEB = 0; + OIDCAPPLICATIONTYPE_USER_AGENT = 1; + OIDCAPPLICATIONTYPE_NATIVE = 2; +} + +enum OIDCAuthMethodType { + OIDCAUTHMETHODTYPE_BASIC = 0; + OIDCAUTHMETHODTYPE_POST = 1; + OIDCAUTHMETHODTYPE_NONE = 2; +} + +message ClientSecret { + string client_secret = 1; +} + +message ApplicationSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Application result = 4; +} + +message ApplicationSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ApplicationSearchQuery queries = 4; +} + +message ApplicationSearchQuery { + ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ApplicationSearchKey { + APPLICATIONSERACHKEY_UNSPECIFIED = 0; + APPLICATIONSEARCHKEY_APP_NAME = 1; +} + +message ProjectGrant { + string id = 1; + string project_id = 2; + string granted_org_id = 3; + string granted_org_name = 4; + string granted_org_domain = 5; + repeated string role_names = 6; + ProjectGrantState state = 7; + google.protobuf.Timestamp creation_date = 8; + google.protobuf.Timestamp change_date = 9; + string project_name = 10; +} + +message ProjectGrantCreate { + string project_id = 1; + string granted_org_id = 2; + repeated string role_names = 3; +} + +message ProjectGrantUpdate { + string project_id = 1; + string id = 2; + repeated string role_names = 3; +} + +message ProjectGrantID { + string project_id = 1; + string id = 2; +} + +message GrantedGrantID { + string id = 1; +} + +enum ProjectGrantState { + PROJECTGRANTSTATE_UNSPECIFIED = 0; + PROJECTGRANTSTATE_ACTIVE = 1; + PROJECTGRANTSTATE_INACTIVE = 2; +} + +message ProjectGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectGrant result = 4; +} + +message ProjectGrantSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; +} + +message ProjectGrantMemberRoles { + repeated string roles = 1; +} + +message ProjectGrantMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message ProjectGrantMemberAdd { + string project_id = 1; + string grant_id = 2; + string user_id = 3; + repeated string roles = 4; +} + +message ProjectGrantMemberChange { + string project_id = 1; + string grant_id = 2; + string user_id = 3; + repeated string roles = 4; +} + +message ProjectGrantMemberRemove { + string project_id = 1; + string grant_id = 2; + string user_id = 3; +} + +message ProjectGrantMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectGrantMember result = 4; +} + +message ProjectGrantMemberSearchRequest { + string project_id = 1; + string grant_id = 2; + uint64 offset = 3; + uint64 limit = 4; + repeated ProjectGrantMemberSearchQuery queries = 5; +} + +message ProjectGrantMemberSearchQuery { + ProjectGrantMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectGrantMemberSearchKey { + PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED = 0; + PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME = 1; + PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME = 2; + PROJECTGRANTMEMBERSEARCHKEY_EMAIL = 3; + PROJECTGRANTMEMBERSEARCHKEY_USER_ID = 4; +} + +message UserGrant { + string id = 1; + string user_id = 2; + string org_id = 3; + string project_id = 4; + repeated string role_names = 5; + UserGrantState state = 6; + google.protobuf.Timestamp creation_date = 7; + google.protobuf.Timestamp change_date = 8; + string user_name = 9; + string first_name = 10; + string last_name = 11; + string email = 12; + string org_name = 13; + string org_domain = 14; + string project_name = 15; +} + +message UserGrantCreate { + string user_id = 1; + string org_id = 2; + string project_id = 3; + repeated string role_names = 4; +} + +message UserGrantUpdate { + string user_id = 1; + string id = 2; + repeated string role_names = 3; +} + +message UserGrantID { + string user_id = 1; + string id = 2; +} + +message ProjectUserGrantID { + string project_id = 1; + string user_id = 2; + string id = 3; +} + +message ProjectUserGrantUpdate { + string project_id = 1; + string user_id = 2; + string id = 3; + repeated string role_names = 4; +} + +message ProjectGrantUserGrantID { + string project_grant_id = 1; + string user_id = 2; + string id = 3; +} + +message ProjectGrantUserGrantCreate { + string user_id = 1; + string org_id = 2; + string project_grant_id = 3; + string project_id = 4 [(validate.rules).string.min_len = 1]; + repeated string role_names = 5; +} + +message ProjectGrantUserGrantUpdate { + string project_grant_id = 1; + string user_id = 2; + string id = 3; + repeated string role_names = 4; +} + +enum UserGrantState { + USERGRANTSTATE_UNSPECIFIED = 0; + USERGRANTSTATE_ACTIVE = 1; + USERGRANTSTATE_INACTIVE = 2; +} + + +message UserGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated UserGrant result = 4; +} + +message UserGrantSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + repeated UserGrantSearchQuery queries = 3; +} +message UserGrantSearchQuery { + UserGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2 [(validate.rules).enum = {in: [0]}]; + string value = 3; +} + +enum UserGrantSearchKey { + USERGRANTSEARCHKEY_UNSPECIFIED = 0; + USERGRANTSEARCHKEY_PROJECT_ID = 1; + USERGRANTSEARCHKEY_USER_ID = 2; + USERGRANTSEARCHKEY_ORG_ID = 3; +} + +message ProjectUserGrantSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated UserGrantSearchQuery queries = 4; +} + +message ProjectGrantUserGrantSearchRequest { + string project_grant_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated UserGrantSearchQuery queries = 4; +} + +message AuthGrantSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + AuthGrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}]; + bool asc = 4; + repeated AuthGrantSearchQuery queries = 5; +} + +message AuthGrantSearchQuery { + AuthGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2 [(validate.rules).enum = {in: [0]}]; + string value = 3; +} + +enum AuthGrantSearchKey { + AUTHGRANTSEARCHKEY_UNSPECIFIED = 0; + AUTHGRANTSEARCHKEY_ORG_ID = 1; + AUTHGRANTSEARCHKEY_PROJECT_ID = 2; + AUTHGRANTSEARCHKEY_USER_ID = 3; +} + +message AuthGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated AuthGrant result = 4; +} + +message AuthGrant { + string orgId = 1; + string projectId = 2; + string userId = 3; + repeated string roles = 4; +} diff --git a/pkg/management/management.go b/pkg/management/management.go index 9f6af48229..1aaea27617 100644 --- a/pkg/management/management.go +++ b/pkg/management/management.go @@ -2,9 +2,7 @@ package management import ( "context" - "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" app "github.com/caos/zitadel/internal/management" "github.com/caos/zitadel/pkg/management/api" ) @@ -14,6 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "MANAG-h3k3x", "not implemented yet") //TODO: implement +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) }